Valid HTML 4.0! Valid CSS!
%%% -*-BibTeX-*-
%%% ====================================================================
%%%  BibTeX-file{
%%%     author          = "Nelson H. F. Beebe",
%%%     version         = "1.00",
%%%     date            = "01 August 2018",
%%%     time            = "17:23:52 MDT",
%%%     filename        = "sigsoft1990.bib",
%%%     address         = "University of Utah
%%%                        Department of Mathematics, 110 LCB
%%%                        155 S 1400 E RM 233
%%%                        Salt Lake City, UT 84112-0090
%%%                        USA",
%%%     telephone       = "+1 801 581 5254",
%%%     FAX             = "+1 801 581 4148",
%%%     URL             = "http://www.math.utah.edu/~beebe",
%%%     checksum        = "34222 31397 155436 1477549",
%%%     email           = "beebe at math.utah.edu, beebe at acm.org,
%%%                        beebe at computer.org (Internet)",
%%%     codetable       = "ISO/ASCII",
%%%     keywords        = "ACM SIGSOFT Software Engineering Notes;
%%%                        bibliography; BibTeX",
%%%     license         = "public domain",
%%%     supported       = "yes",
%%%     docstring       = "This is a COMPLETE bibliography of ACM
%%%                        SIGSOFT Software Engineering Notes (CODEN
%%%                        SFENDP, ISSN 0163-5948 (print), 1943-5843
%%%                        (electronic)) for the years 1990--1999.
%%%                        Other decades are covered in companion
%%%                        bibliographies named sigsoftYYY0.bib.
%%%
%%%                        Publication began with volume 1, number 1, in
%%%                        May 1976, and there are up to 8 issues per
%%%                        annual volume.
%%%
%%%                        The journal has Web sites at:
%%%
%%%                            http://www.sigsoft.org/
%%%                            https://dl.acm.org/citation.cfm?id=J728
%%%
%%%                        At version 1.00, the COMPLETE year coverage
%%%                        looked like this:
%%%
%%%                             1990 (  84)    1994 (  66)    1998 ( 135)
%%%                             1991 (  61)    1995 ( 127)    1999 ( 115)
%%%                             1992 (  54)    1996 ( 149)
%%%                             1993 (  79)    1997 ( 147)
%%%
%%%                             Article:       1017
%%%
%%%                             Total entries: 1017
%%%
%%%                        The checksum field above contains a CRC-16
%%%                        checksum as the first value, followed by the
%%%                        equivalent of the standard UNIX wc (word
%%%                        count) utility output of lines, words, and
%%%                        characters.  This is produced by Robert
%%%                        Solovay's checksum utility.",
%%%  }
%%% ====================================================================
@Preamble{"\ifx \undefined \booktitle \def \booktitle #1{{{\em #1}}} \fi"}

%%% ====================================================================
%%% Acknowledgement abbreviations:
@String{ack-nhfb = "Nelson H. F. Beebe,
                    University of Utah,
                    Department of Mathematics, 110 LCB,
                    155 S 1400 E RM 233,
                    Salt Lake City, UT 84112-0090, USA,
                    Tel: +1 801 581 5254,
                    FAX: +1 801 581 4148,
                    e-mail: \path|beebe@math.utah.edu|,
                            \path|beebe@acm.org|,
                            \path|beebe@computer.org| (Internet),
                    URL: \path|http://www.math.utah.edu/~beebe/|"}

%%% ====================================================================
%%% Journal abbreviations:
@String{j-SIGSOFT               = "ACM SIGSOFT Software Engineering Notes"}

%%% ====================================================================
%%% Bibliography entries, sorted by publication order with ``bibsort
%%% --byvolume'':
@Article{Neumann:1990:RPCa,
  author =       "Peter G. Neumann",
  title =        "Risks to the public in computers and related systems",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "1",
  pages =        "4--23",
  month =        jan,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/382294.382295",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Knight:1990:RCK,
  author =       "John C. Knight and Nancy G. Leveson",
  title =        "A reply to the criticisms of the {Knight \& Leveson}
                 experiment",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "1",
  pages =        "24--35",
  month =        jan,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/382294.382710",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
  remark =       "The original paper is J. C. Knight and N. G. Leveson,
                 \booktitle{An Experimental Evaluation of the Assumption
                 of Independence in Multi-version Programming}, IEEE
                 Transactions on Software Engineering, Vol. SE-12, No. 1
                 (January 1986), pp. 96--109.",
}

@Article{Britton:1990:TAD,
  author =       "Carol Britton and Jill Doake and Richard Mitchell",
  title =        "Taming the abstract data type: a taxonomy to help
                 information systems designers",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "1",
  pages =        "36--41",
  month =        jan,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/382294.382711",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The overall aim of our research is to investigate the
                 use of data abstraction in the early stages of the
                 development of information systems. In this paper we
                 suggest a simple classification of abstract data types
                 as a guide to inexperienced system developers in the
                 transition from an initial problem statement to a
                 system description using data abstraction. The
                 classification identifies different roles that abstract
                 data types can play in a system description: providing
                 simple values; providing the ability to calculate with
                 simple values; providing the means to build tuples and
                 sets from simpler types; and providing the means to
                 express the required systems inputs and outputs.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Chan:1990:COO,
  author =       "M. L. Chan and B. Henderson-Sellers",
  title =        "{Corporate Object-oriented Development Environment
                 (CODE)}",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "1",
  pages =        "42--43",
  month =        jan,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/382294.382713",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The maximum potential of the object-oriented paradigm
                 relies on reusability of existing code. For full
                 realisation in the corporate environment it is crucial
                 that evolving libraries of reusable modules be managed
                 efficiently and effectively. A framework for such
                 management is proposed: the Corporate Object-oriented
                 Development Environment (CODE).",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Loy:1990:COO,
  author =       "Patrick H. Loy",
  title =        "A comparison of object-oriented and structured
                 development methods",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "1",
  pages =        "44--48",
  month =        jan,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/382294.382714",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The significance of ``object-oriented'' as a
                 development method, and the current confusion over the
                 term are addressed. A set of characteristics is
                 proposed as a basis for agreement on a definition of
                 the term. Object-oriented development is compared to
                 the ``structured techniques,'' and work in progress on
                 integrating the two methods is reviewed. Practical
                 recommendations on assessing the importance of
                 object-oriented development are given.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Hecht:1990:COO,
  author =       "Alan Hecht",
  title =        "Cute object-oriented acronyms considered {FOOlish}",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "1",
  pages =        "48",
  month =        jan,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/382294.382715",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Brinkkemper:1990:DMC,
  author =       "S. Brinkkemper and M. de Lange and R. Looman and F. H.
                 G. C. van der Steen",
  title =        "On the derivation of method companionship by
                 meta-modelling",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "1",
  pages =        "49--58",
  month =        jan,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/382294.382716",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "For an efficient and effective system development the
                 relation between methods and tools should be maintained
                 carefully. This relation --- called method
                 companionship --- can be derived using the mata-data
                 models and meta-activity models of methods and tools.
                 In order to formulate guide-lines for the use of the
                 Information Engineering Workbench (IEW) within the
                 System Development Methodology (SDM), we discuss the
                 determination of the meta-data models and a formal
                 derivation of the support. The structure of the
                 guide-lines is discussed together with their
                 verification within some organizations. Finally, some
                 conclusions from this research are given.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Zhou:1990:PSP,
  author =       "Wanlei Zhou",
  title =        "{PM}: a system for prototyping and monitoring remote
                 procedure call programs",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "1",
  pages =        "59--63",
  month =        jan,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/382294.382717",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The design and implementation of a software tool PM
                 for prototyping and monitoring remote procedure call
                 (RPC) programs is described. The tool has two parts: a
                 prototyping generator and a monitor. The prototyping
                 generator takes as input several server description
                 files, one for each server, analyses them, and produces
                 a group of source files of the RPC prototype program.
                 If debug option is chosen during prototyping, the
                 produced programs will be monitored by the monitor. The
                 monitor records all events of an RPC-based program into
                 the monitor's database. Facilities are provided for
                 programmers to define, choose, and combine events that
                 will be recorded. Partial ordering among events is
                 built after the program's execution. An user can use
                 this relation to trace and replay the program's
                 execution. The tool forms a proper environment for
                 RPC-based program development.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Caron:1990:BTD,
  author =       "Jacqueline M. Caron and Peter A. Darnell",
  title =        "{Bugfind}: a tool for debugging optimizing compilers",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "1",
  pages =        "64--65",
  month =        jan,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/382294.382719",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This paper describes a tool for isolating modules that
                 are compiled incorrectly when optimization is invoked.
                 This tool benefits application developers by
                 automatically compiling each module to its highest
                 level of correct optimization. It benefits compiler
                 writers by pinpointing failing modules.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Offutt:1990:CT,
  author =       "A. Jefferson Offutt",
  title =        "Comments on Tai",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "1",
  pages =        "67",
  month =        jan,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/382294.382720",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Brandt:1990:QMD,
  author =       "Dennis L. Brandt",
  title =        "Quality measures in design: finding problems before
                 coding",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "1",
  pages =        "68--72",
  month =        jan,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/382294.383048",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Structure Charts are the third major deliverable of a
                 structured design, following the logical model and the
                 physical model. Code is usually written immediately
                 after the Structure Charts are approved. Many metrics
                 are available for measuring code complexity and some
                 forms of data coupling. Applying similar metrics to the
                 design might be used to find problems in complexity and
                 coupling before interfaces are formalized and code is
                 written. This paper reviews complexity and coupling
                 code measures which could be applied to structure
                 charts. Since there has been little analysis and data
                 collected in this area, it is proposed that relative
                 figures of merit can be derived from structure charts.
                 It is also proposed that in large systems, structure
                 charts with out of normal figures of merit are
                 candidates for detailed review. The general outline of
                 an Automated Auditor is also defined as a tool to
                 assist designers and reviewers in design analysis.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Polack:1990:PAC,
  author =       "Alexander J. Polack",
  title =        "Practical applications of {CASE} tools on {DoD}
                 projects",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "1",
  pages =        "73--78",
  month =        jan,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/382294.382724",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The use of software in the defense--related systems
                 has increased substantially in the last decade. The
                 Department of Defense has developed a comprehensive
                 standard for software development. Known as
                 DoD-STD-2167 A, its use is now mandated for all DoD
                 projects. CASE tools are uniquely positioned to help
                 DoD contractors in fulfilling the requirements of the
                 standard. This article discusses some of the practical
                 aspects of CASE technology applications in the DoD
                 contracting environment. An example, using Software
                 Requirements Analysis activity, is given.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Tahvanainen:1990:ACB,
  author =       "Veli-Pekka Tahvanainen and Kari Smolander",
  title =        "An annotated {CASE} bibliography",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "1",
  pages =        "79--92",
  month =        jan,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/382294.382727",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Terwilliger:1990:OBE,
  author =       "Robert B. Terwilliger",
  title =        "An overview and bibliography of {ENCOMPASS}: an
                 environment for incremental software development using
                 executable, logic-based specification",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "1",
  pages =        "93--94",
  month =        jan,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/382294.382728",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Holbrook:1990:SBM,
  author =       "H. {Holbrook III}",
  title =        "A scenario-based methodology for conducting
                 requirements elicitation",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "1",
  pages =        "95--104",
  month =        jan,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/382294.382725",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Requirements analysis is the process of identifying a
                 user's needs and determining what to build in an a
                 system. Within requirements analysis is the process of
                 requirements elicitation in which tacit information
                 about ``what to build'' is obtained from the user and
                 his environment. Here, we will describe a methodology,
                 dubbed Scenario Based Requirements Elicitation (SBRE),
                 which structures the early interaction between users
                 and designers in order to quickly develop a set of
                 initial requirements. The methodology features the
                 parallel development of requirements and a high-level
                 design, the use of scenarios to communicate the
                 behavior of a design, an evaluation function to assess
                 the suitability of the design, and an issue base with
                 which to maintain the issues that arise during the
                 elicitation process.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Neumann:1990:RPCb,
  author =       "Peter G. Neumann",
  title =        "Risks to the public in computers and related systems",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "2",
  pages =        "3--22",
  month =        apr,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/382296.382297",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:30 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Delgado:1990:ITS,
  author =       "Joseph F. Delgado",
  title =        "Issues in transfer of skills in software engineering
                 training",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "2",
  pages =        "23--25",
  month =        apr,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/382296.382695",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:30 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This paper summarizes issues of skills transfer in
                 current software engineering training, under the
                 categories of management support, training resources,
                 scheduling, training process, and incentives.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Clark:1990:FVD,
  author =       "Jon D. Clark",
  title =        "Function versus data-driven methodologies: a
                 prescriptive metric",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "2",
  pages =        "26",
  month =        apr,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/382296.382696",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:30 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Bowles:1990:NYS,
  author =       "Adrion J. Bowles",
  title =        "A note on the Yourdon structured method",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "2",
  pages =        "27",
  month =        apr,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/382296.382697",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:30 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Brown:1990:CCQ,
  author =       "Bradley J. Brown",
  title =        "Correctness is not congruent with quality",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "2",
  pages =        "28",
  month =        apr,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/382296.382698",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:30 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Duncan:1990:OMT,
  author =       "I. M. M. Duncan and D. J. Robson",
  title =        "Ordered mutation testing",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "2",
  pages =        "29--30",
  month =        apr,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/382296.382699",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:30 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Mutation Analysis is an established technique for test
                 data generation and source code testing. Developed
                 systems have concentrated on applying some or all of
                 the possible mutant operators (perturbations) to the
                 submitted code. Recent work tackled the scheduling of
                 mutant program execution on vector processors or a
                 Hypercube as a cost reduction scheme. This paper
                 discusses a logical mechanism of impact driven testing
                 in order to achieve full mutation testing with reduced
                 overheads regardless of implementation. Guiding the
                 mutant generation by block impact together with mutant
                 operator heirarchies and a test data coverage scheme
                 enable an efficient tool to be constructed.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Wybolt:1990:ECO,
  author =       "Nicholas Wybolt",
  title =        "Experiences with {C++} and object-oriented software
                 development",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "2",
  pages =        "31--39",
  month =        apr,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/382296.382700",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:30 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Object-oriented is a very hot topic and buzzword both
                 in academia and industry. There are object-oriented
                 analysis and design techniques, object-oriented
                 languages and databases, and so on. Many people see the
                 letters ``OO'', attach a ``G'' to the front, and a
                 ``D'' to the back and deem it to be ``GOOD'' ---
                 without much consideration for what it means in the
                 software life cycle. This paper discusses the on-going
                 (3+ years) object-oriented re-design and
                 re-implementation in C++ of a commercial CASE tool.
                 Specifically, why an object-oriented approach was
                 chosen and the implications and collective experiences
                 of this approach. In addition to the anticipated
                 benefits, much of what we experienced was unforeseen
                 and unexpected.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Koelbel:1990:WRE,
  author =       "Chuck Koelbel and Gene Spafford and George Leach",
  title =        "Workshop report: experiences with building distributed
                 and multiprocessor systems",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "2",
  pages =        "39--41",
  month =        apr,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/382296.382701",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:30 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Tracz:1990:WDR,
  author =       "Will Tracz",
  title =        "Where does reuse start?",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "2",
  pages =        "42--46",
  month =        apr,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/382296.382702",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:30 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Prieto-Diaz:1990:DAI,
  author =       "Rub{\'e}n Prieto-D{\'\i}az",
  title =        "Domain analysis: an introduction",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "2",
  pages =        "47--54",
  month =        apr,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/382296.382703",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:30 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The objective of this paper is to provide a brief
                 introduction to the area of domain analysis as seen
                 from the software engineering perspective. The approach
                 is by illustrating the concepts through selected
                 reported experiences and to point out the specific
                 characteristics of these experiences that relate to
                 domain analysis. Definitions are introduced after the
                 examples to avoid over explaining the concepts. A model
                 for the domain analysis process is also proposed. The
                 concept of a library based domain infrastructure is
                 introduced as an attempt to show how domain analysis is
                 integrated into the software development process.A
                 second objective in this paper is to give a perspective
                 on some of the research issues facing domain analysis.
                 The nature of the process calls for a variety of
                 multidiciplinary issues ranging from knowledge
                 acquisition and knowledge representation to management
                 and methodologies to cultural and social questions.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Cabral:1990:ISM,
  author =       "Regina H. B. Cabral and Ivan M. Campos and Donald D.
                 Cowan and Carlos J. P. Lucena",
  title =        "Interfaces as specifications in the {MIDAS} user
                 interface development systems",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "2",
  pages =        "55--69",
  month =        apr,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/382296.382704",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:30 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This paper describes an evolving User Interface
                 Development System called MIDAS (for Merging Interface
                 Development with Application Specification) which
                 allows interface/systems designers to develop an
                 application-specific user interface interactively, in a
                 prototyping-oriented environment, while refining the
                 specification of the intended application itself. The
                 interface/systems designer receives expert advice on
                 both interface and application software design
                 principles, emerging from MIDAS' knowledge base, and
                 can also animate the intended user dialogue with the
                 interface being designed via an extensive set of visual
                 programming aids. The generated interface can be
                 further customized by the end-user, by flexibly
                 altering the default appearance of the dialogue
                 scenarios. Furthermore, the application-specific
                 end-user interface is also knowledge based. Its domain
                 knowledge covers user modeling and the application
                 domain, in order to adapt itself dynamically to
                 different degrees of user familiarity with the
                 application, from novice to expert. Both the interface
                 code and the programming-in-the-large of the
                 application code are developed within an
                 object-oriented framework. A proposal for a software
                 life cycle model based on the rapid prototyping of user
                 interfaces as a means to refining the specification of
                 the application all the way down to the import-export
                 list and module semantics specification for each and
                 every application module is also presented. The
                 lifecycle model is rule-encoded in MIDAS' knowledge
                 base. The interface/systems designer is guided by the
                 interpretation of those rules. MIDAS aims to provide a
                 testbed for new ideas in human-computer interfaces,
                 knowledge-based support of design activities and life
                 cycle models based on rapid prototyping of user
                 interfaces.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Coomber:1990:GTP,
  author =       "C. J. Coomber and R. E. Childs",
  title =        "A graphical tool for the prototyping of real-time
                 systems",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "2",
  pages =        "70--82",
  month =        apr,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/382296.382705",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:30 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This paper describes a prototyping tool for the design
                 and execution of real-time system specifications known
                 as transformation schemas. The tool comprises an editor
                 that makes full use of windows, menus, and icons; and a
                 simulator that executes transformation schemas based on
                 an object-oriented strategy. The tool not only enables
                 the syntactic correctness of a transformation schema to
                 be verified, but also assists in proving its semantic
                 correctness.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Terry:1990:TSE,
  author =       "B. Terry and D. Logee",
  title =        "Terminology for Software Engineering Environment
                 {(SEE)} and Computer-Aided Software Engineering
                 {(CASE)}",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "2",
  pages =        "83--94",
  month =        apr,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/382296.382706",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:30 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Tripp:1990:CES,
  author =       "Leonard L. Tripp",
  title =        "{CASE} evaluation and selection bibliography",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "2",
  pages =        "95",
  month =        apr,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/382296.382707",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:30 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Yeung:1990:IJD,
  author =       "W. L. Yeung and G. Topping",
  title =        "Implementing {JSD} designs in {Ada}: a tutorial",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "3",
  pages =        "25--32",
  month =        jul,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/101114.101115",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:31 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/adabooks.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The Jackson System Development (JSD) method is widely
                 recognized as viable for the design of real-time
                 embedded systems. This paper discusses the
                 implementation of JSD designs in Ada through a
                 simulated lift control example.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Coomer:1990:DRS,
  author =       "T. N. {Coomer, Jr.} and J. R. Comer and D. J. Rodjak",
  title =        "Developing reusable software for military systems, why
                 it is needed, why it isn't working",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "3",
  pages =        "33--38",
  month =        jul,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/101114.101116",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:31 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This paper discusses the importance of developing
                 reusable software component libraries for Department of
                 Defense (DoD) military software systems, as well as a
                 few of the main reasons why current approaches are not
                 working. A working definition of software reusability
                 is established and the major goals of reuse are
                 examined. The emphasis of the paper is on the necessary
                 characteristics of a reusable software component as
                 well as the compilation and utilization of reusable
                 component libraries. The roles of UNIX{\TM}, Ada{\reg},
                 and C in the development of reusable components are
                 examined. Many of the problems facing the development
                 of adaptable, reusable software components are outlined
                 as well as some possible solutions to these problems.
                 Conclusions are drawn concerning the critical need for
                 these software characteristics in DoD military systems
                 of the future.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Gyorkos:1990:ICT,
  author =       "J. Gy{\"o}rk{\"o}s and I. Rozman and T. Welzer",
  title =        "Introducing {CASE} tools into the software development
                 group",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "3",
  pages =        "39--41",
  month =        jul,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/101114.101117",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:31 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Conventional groups for software development try to
                 increase its efficiency with a more advanced approach
                 to all phases of software life cycle. The need for more
                 formal specifications demands the introduction of
                 computer aided tools which base on the empirically
                 confirmed methodologies. The most important task of
                 CASE tools is to unite the methodologies for covering
                 various life cycle phases under one shell. In the paper
                 the problems, appearing in the contact of the tool with
                 the subjects of the developers team are described.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Balda:1990:CEM,
  author =       "D. Balda and D. A. Gustafson",
  title =        "Cost estimation models for reuse and prototype {SW}
                 development life-cycles",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "3",
  pages =        "42--50",
  month =        jul,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/101114.101118",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:31 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The Cocomo cost estimation model was developed to
                 estimate the cost of developing software utilizing the
                 waterfall life-cycle model. The assumptions in the
                 waterfall model account for many software development
                 situations, but do not account for the actual
                 development process when the requirements are known to
                 be unstable or incomplete or when extensive code and
                 design information are reused. The prototype and reuse
                 life-cycle models, respectively, were developed to
                 model these specific situations. The assumptions made
                 by any life-cycle model directly influence its cost
                 estimation model; therefore, when the life-cycle model
                 is inappropriate, its cost estimation model is also
                 inappropriate. This makes the Cocomo cost estimation
                 model inadequate for estimating development effort for
                 software developed utilizing the prototype or reuse
                 software development life-cycle models. Two cost
                 estimation models, one for the prototype software
                 life-cycle model and one for the reuse software
                 life-cycle model, are presented. Each cost estimation
                 model is derived from the basic Cocomo model and
                 modified to fit the characteristics of its respective
                 life-cycle model.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Martinis:1990:SCC,
  author =       "J. Martinis",
  title =        "Softool change\slash configuration management",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "3",
  pages =        "51",
  month =        jul,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/101114.101119",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:31 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Bolognesi:1990:SGR,
  author =       "Tommaso Bolognesi",
  title =        "On the soundness of graphical representations of
                 interconnected processes in {LOTOS}",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "4",
  pages =        "1--7",
  month =        sep,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/99571.99574",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:32 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Chung:1990:EED,
  author =       "Anthony Chung and Deepinder Sidhu",
  title =        "Experience with an {Estelle} development system",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "4",
  pages =        "8--17",
  month =        sep,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/99571.99801",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:32 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{DeMan:1990:MLM,
  author =       "Jozef {De Man}",
  title =        "Making languages more powerful by removing
                 limitations",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "4",
  pages =        "18--24",
  month =        sep,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/99571.99805",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:32 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Eggert:1990:TSP,
  author =       "Paul Eggert",
  title =        "Toward special-purpose program verification",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "4",
  pages =        "25--29",
  month =        sep,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/99571.99807",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:32 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Frost:1990:CPC,
  author =       "Richard A. Frost",
  title =        "Constructing programs in a calculus of lazy
                 interpreters",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "4",
  pages =        "30--41",
  month =        sep,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/99571.99810",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:32 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Garlan:1990:RFR,
  author =       "David Garlan",
  title =        "The role of formal reusable frameworks",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "4",
  pages =        "42--44",
  month =        sep,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/99571.99812",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:32 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Jacky:1990:FSC,
  author =       "Jonathan Jacky",
  title =        "Formal specification for a clinical cyclotron control
                 system",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "4",
  pages =        "45--54",
  month =        sep,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/99571.99814",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:32 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Ledru:1990:AVL,
  author =       "Yves Ledru and Pierre-Yves Schobbens",
  title =        "Applying {VDM} to large developments",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "4",
  pages =        "55--58",
  month =        sep,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/99571.99815",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:32 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Logrippo:1990:ASL,
  author =       "Luigi Logrippo and Tim Melanchuk and Robert J. {Du
                 Wors}",
  title =        "The algebraic specification language {LOTOS}: an
                 industrial experience",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "4",
  pages =        "59--66",
  month =        sep,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/99571.99817",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:32 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Narayana:1990:IPD,
  author =       "K. T. Narayana and Sanjeev Dharap",
  title =        "Invariant properties in a dialog system",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "4",
  pages =        "67--79",
  month =        sep,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/99571.99818",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:32 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Ness:1990:PET,
  author =       "Linda Ness",
  title =        "{L.0}: a parallel executable temporal logic language",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "4",
  pages =        "80--89",
  month =        sep,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/99571.99820",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:32 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Nord:1990:FMM,
  author =       "Robert L. Nord and Peter Lee and William L. Scherlis",
  title =        "Formal manipulation of modular software systems",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "4",
  pages =        "90--99",
  month =        sep,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/99571.99825",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:32 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Platek:1990:FMM,
  author =       "Richard Platek",
  title =        "Formal methods in mathematics",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "4",
  pages =        "100--103",
  month =        sep,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/99571.99827",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:32 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Reddy:1990:FMT,
  author =       "Uday S. Reddy",
  title =        "Formal methods in transformational derivation of
                 programs",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "4",
  pages =        "104--114",
  month =        sep,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/99571.99828",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:32 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Runciman:1990:FDS,
  author =       "Colin Runciman and Mike Firth",
  title =        "Formalised development of software by machine assisted
                 transformation",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "4",
  pages =        "115--117",
  month =        sep,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/99571.99829",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:32 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Toetenel:1990:SAF,
  author =       "Hans Toetenel and Jan van Katwijk and Nico Plat",
  title =        "Structured analysis --- formal design, using stream
                 and object oriented formal specifications",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "4",
  pages =        "118--127",
  month =        sep,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/99571.99830",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:32 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Wile:1990:ARA,
  author =       "David S. Wile",
  title =        "Adding relational abstraction to programming
                 languages",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "4",
  pages =        "128--139",
  month =        sep,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/99571.99833",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:32 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Wing:1990:ELP,
  author =       "Jeannette M. Wing and Chun Gong",
  title =        "Experience with the Larch Prover",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "4",
  pages =        "140--143",
  month =        sep,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/99571.99835",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:32 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Wood:1990:AFM,
  author =       "William G. Wood",
  title =        "Application of formal methods to system and software
                 specification",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "4",
  pages =        "144--146",
  month =        sep,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/99571.99837",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:32 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Young:1990:VPS,
  author =       "William D. Young",
  title =        "Verified program support environments",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "4",
  pages =        "147--149",
  month =        sep,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/99571.99839",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:32 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Neumann:1990:RP,
  author =       "P. G. Neumann",
  title =        "Risks to the public",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "5",
  pages =        "3--17",
  month =        oct,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/101328.101330",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:33 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Ketchum:1990:CCQ,
  author =       "D. W. Ketchum",
  title =        "Correctness is not congruent with quality",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "5",
  pages =        "18",
  month =        oct,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/101328.101331",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:33 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Lott:1990:CCQ,
  author =       "C. M. Lott",
  title =        "Correctness is congruent with quality",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "5",
  pages =        "19--20",
  month =        oct,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/101328.101332",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:33 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Laplante:1990:HU,
  author =       "P. Laplante",
  title =        "{Heisenberg} Uncertainty",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "5",
  pages =        "21--22",
  month =        oct,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/101328.101333",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:33 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/bibnet/authors/h/heisenberg-werner.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "In this paper it is suggested that the Heisenberg
                 Uncertainty Principle, normally applied to physical
                 systems, can be applied in analogy to certain phenomena
                 found in software engineering. The point is illustrated
                 with several examples. The applications of this
                 principle in the design and testing of software is
                 discussed. The import of this is that paradigms
                 relating physical phenomena to software engineering may
                 be found.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Aiken:1990:ABS,
  author =       "M. W. Aiken",
  title =        "{AI} based simulation in reusability",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "5",
  pages =        "23--27",
  month =        oct,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/101328.101334",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:33 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This paper presents a knowledge-based approach for
                 selecting and testing modular reusable code. This
                 approach entails three stages: system definition
                 through a system entity structure (SES), SES pruning
                 and model synthesis using an expert system (ES), and
                 the evaluation of candidate design models using
                 discrete event simulation (DEVS). An example of this
                 approach is shown through the development of a Group
                 Decision Support System (GDSS) idea generation tool.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Carasik:1990:DDG,
  author =       "R. P. Carasik and S. M. Johnson and D. A. Patterson
                 and G. A. {Von Glahn}",
  title =        "Domain description grammar: application of linguistic
                 semantics",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "5",
  pages =        "28--43",
  month =        oct,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/101328.101335",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:33 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Domain descriptions should represent more than the
                 characteristics of data and the operations on it. They
                 should be ``semantic'' in the sense that they may
                 represent information such as the meanings of special
                 terms used in the business, as well as goals and rules.
                 ER models are often described as ``semantic data
                 models''. However, the correspondence between ER and
                 natural language is through syntactic rather than
                 through semantic constructs. Conceptual modeling
                 languages and knowledge representation techniques are
                 more appropriate for representing domain meaning.
                 Modern research in linguistics, semantics, and
                 artificial intelligence provides valuable insight into
                 basic issues regarding such representations. Domain
                 descriptions must use languages based on
                 generally-accepted linguistic and knowledge
                 representation principles.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Jean:1990:ETO,
  author =       "C. Jean and A. Strohmeier",
  title =        "An experience in teaching {OOD} for {Ada} software",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "5",
  pages =        "44--49",
  month =        oct,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/101328.101336",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:33 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/adabooks.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Overmyer:1990:DSM,
  author =       "S. P. Overmyer",
  title =        "{DoD-Std-2167A} and methodologies",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "5",
  pages =        "50--59",
  month =        oct,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/101328.101338",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:33 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Many experts in software engineering agree that the
                 emerging iterative requirements engineering, software
                 engineering and software design methodologies present
                 excellent ways to identify and validate user
                 requirements. These methodologies often include
                 innovative techniques for elicitation and validation of
                 user requirements including various forms of human
                 engineering analysis, rapid prototyping, and knowledge
                 acquisition tasks. This paper addresses the
                 compatibility of these techniques with DoD-Std-2167A.
                 Assessment is made regarding the compatibility of the
                 standard with innovative requirements techniques, and
                 how and where these techniques may be inserted into the
                 life cycle.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Mrdalj:1990:BOO,
  author =       "S. Mrdalj",
  title =        "Biblio of object-oriented system development",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "5",
  pages =        "60--63",
  month =        oct,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/101328.101339",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:33 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "An increasing number of articles and books is being
                 published in the area of object-oriented system
                 development (OOSD). A need for collection,
                 classification and evaluation of the available material
                 is already evident. This is why we decided to collect a
                 bibliography when we started our research project on
                 comparison of object-oriented analysis and design
                 methods. Most of the included items do not attack the
                 whole problem of OOSD but together they represent work
                 done on many aspects of the problem. Some are related
                 to the system design using various object-oriented
                 programming languages. Also a few items have been
                 included that deal with object-oriented principles in
                 general. There are even some which are ``comments'' or
                 ``discussions'' on the topic. The items were chosen on
                 the basis that they should have some direct reference
                 to object-oriented system development. This
                 bibliography contains material in the field that has
                 been published before Spring 1990. It is by no means
                 supposed to be complete. If any references of
                 particular significance have been omitted, the author
                 would appreciate hearing about them. I hope this
                 bibliography will help those planning to build
                 object-oriented systems, or those who are working on
                 new OOSD methods.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Garlan:1990:LCA,
  author =       "David Garlan and Ehsan Ilias",
  title =        "Low-cost, adaptable tool integration policies for
                 integrated environments",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "6",
  pages =        "1--10",
  month =        dec,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/99278.99279",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:34 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "An important requirement for successful integrated
                 programming environments is support for implicit tool
                 invocation; rather than force a user to explicitly
                 invoke each tool, mechanisms in the environment can
                 take responsibility for guaranteeing that the right
                 tools are invoked at the right times. However, these
                 mechanisms typically intertwine policies of when and
                 how the tools are invoked, with what the tools do when
                 they are invoked. Consequently, adapting the
                 environment to achieve different tool interactions is
                 often difficult without modifying the code that
                 implements the environment or the tools. In this paper
                 we describe a simple, low-cost mechanism that solves
                 this problem. Specifically, we show how tool
                 integration based on selective broadcast can be adapted
                 to allow dynamically configurable policies of tool
                 interaction. We describe an implementation of these
                 mechanisms, and show how it supports multiple levels of
                 users.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Clement:1990:DAP,
  author =       "Dominique Cl{\'e}ment",
  title =        "A distributed architecture for programming
                 environments",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "6",
  pages =        "11--21",
  month =        dec,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/99278.99280",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:34 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Programming environments are typically based on
                 concepts, such as syntax and semantics, and they
                 provide functionalities, such as parsing, editing,
                 type-checking, and compiling. Most existing programming
                 environments are designed in a fully integrated manner,
                 where parsers, editors, and semantic tools are tightly
                 coupled. This leads to systems that are the sum of all
                 their components, with obvious implications in terms of
                 size, reusability, and maintainability. In this paper,
                 we present a proposal for a distributed architecture
                 for programming environments.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Sullivan:1990:REI,
  author =       "Kevin Sullivan and David Notkin",
  title =        "Reconciling environment integration and component
                 independence",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "6",
  pages =        "22--33",
  month =        dec,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/99278.99281",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:34 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "We present an approach that eases the design and
                 evolution of integrated environments by increasing
                 independence among components. Our approach combines
                 mediators, which localize relationships, and a general
                 event mechanism, which increases the independence of
                 components from relationships in which they
                 participate. To clarify our notion of independence and
                 its relationship to evolution, we analyze four designs
                 for a simple environment. The first three show how
                 common approaches compromise independence in various
                 ways. The fourth design demonstrates how our approach
                 overcomes these problems. Our event mechanism is
                 specially designed to support integration and
                 evolution. We discuss detailed aspects of mediators and
                 events by presenting three environments we have built.
                 Our approach has also given us significant insights
                 into other related systems.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Qian:1990:CMP,
  author =       "Xiaolei Qian and Richard Jullig and Marilyn Daum",
  title =        "Consistency management in a project management
                 assistant",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "6",
  pages =        "34--43",
  month =        dec,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/99278.99282",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:34 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Object management systems have been identified as the
                 core of object-oriented software development
                 environments. One of the most important objectives of
                 object management systems is to maintain consistency
                 between the vast amount of interrelated objects, which
                 is generated, accessed, and manipulated throughout the
                 software life cycle. Consistency management in such
                 systems is beyond the reach of conventional database
                 technology due to the complex structure and the
                 incompleteness of data, the dynamic nature of
                 constraints, and the need to tolerate various levels of
                 inconsistency. We investigate the design issues for
                 consistency management in the context of a Project
                 Management Assistant. Our consistency manager organizes
                 constraints into a hierarchy of consistency, and
                 associates a spectrum of management techniques with
                 classes of constraints. The various levels of
                 consistency are achieved by enabling or disabling
                 classes of constraints, and propagating constraints
                 cross the class boundary. The constraint manager is
                 capable of compiling constraint specifications into
                 triggers attached to objects in the object base. The
                 architecture is open to new constraints and new
                 management techniques.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Minsky:1990:CMC,
  author =       "Naftaly H. Minsky and David Rozenshtein",
  title =        "Configuration management by consensus: an application
                 of law-governed systems",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "6",
  pages =        "44--55",
  month =        dec,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/99278.99283",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:34 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "It is self-evident that if one wants to model and
                 control the cooperative process of software
                 development, one must provide for cooperative decision
                 making. In particular, one should be able to base the
                 decision on whether and how to carry out a given
                 operation on the consensus of several, possibly
                 independent, agents. It is important to emphasize that
                 this is not just a matter of computing the conjunction
                 of some set of conditions. One must also provide a
                 mechanism for establishing any desired consensus
                 structure, which would specify who is allowed to state
                 which kinds of concerns regarding this operation, and
                 what the relationship among these concerns should be.
                 In this paper we propose a general framework for such
                 decision making by consensus, which is based on the
                 concept of law-governed software development. As a
                 concrete application domain in which to illustrate this
                 framework, we consider here the issue of configuration
                 binding.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Tan:1990:CCO,
  author =       "Lichao Tan and Yoichi Shinoda and Takuya Katayama",
  title =        "Coping with changes in an object management system
                 based on attribute grammars",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "6",
  pages =        "56--65",
  month =        dec,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/99278.99284",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:34 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "In this paper, we discuss methods of dealing with
                 change in an object management system OS/O, which is a
                 prototype of an attribute grammar based object
                 management model, called Object-Oriented Attribute
                 Grammars(OOAG)[SK 9Oa]. OOAG is a hybrid model that
                 combines features of functional and object-oriented
                 paradigms. Various aspects of software object databases
                 can be described using its capabilities. Software
                 objects in OOAG are managed as autonomous, hierarchical
                 trees containing attributes. The OOAG is also capable
                 of describing software processes as hierarchies of
                 software objects, with data driven process enaction
                 mechanism. Many aspects of changes to such a tree,
                 including the evolution of the tree type definition, or
                 the dynamic transformation of its internal structure
                 can be dealt with easily by the benefits of a combined
                 attribute grammars based and object oriented paradigm.
                 We also introduce a mechanism that helps to provide an
                 efficient way for manipulating changed objects. The
                 mechanism is characterized by meta-objects that are
                 used to control the evaluation of the changes.
                 Meta-objects prove to be a suitable mechanism for
                 handling change management tasks in evolving object
                 environments.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Jordan:1990:EPE,
  author =       "Mick Jordan",
  title =        "An extensible programming environment for Modula-3",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "6",
  pages =        "66--76",
  month =        dec,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/99278.99285",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:34 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This paper describes the design and implementation of
                 a practical programming environment for the Modula-3
                 programming language. The environment is organised
                 around an extensible intermediate representation of
                 programs and makes extensive use of reusable
                 components. The environment is implemented in Modula-3
                 and exploits some of the novel features of the
                 language.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Ballance:1990:PLB,
  author =       "Robert A. Ballance and Susan L. Graham and Michael L.
                 {Van De Vanter}",
  title =        "The {Pan} language-based editing system for integrated
                 development",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "6",
  pages =        "77--93",
  month =        dec,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/99278.99286",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:34 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Powerful editing systems for developing complex
                 software documents are difficult to engineer. Besides
                 requiring efficient incremental algorithms and complex
                 data structures, such editors must integrate smoothly
                 with the other tools in the environment, maintain a
                 sharable database of information concerning the
                 documents being edited, accommodate flexible editing
                 styles, provide a consistent, coherent, and empowering
                 user interface, and support individual variations and
                 project-wide configurations. Pan is a language-based
                 editing and browsing system that exhibits these
                 characteristics. This paper surveys the design and
                 engineering of Pan, paying particular attention to a
                 number of issues that pervade the system: incremental
                 checking and analysis, information retention in the
                 presence of change, tolerance for errors and anomalies,
                 and extension facilities.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Ipser:1990:MFS,
  author =       "Edward A. Ipser and David S. Wile and Dean Jacobs",
  title =        "A multi-formalism specification environment",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "6",
  pages =        "94--106",
  month =        dec,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/99278.99287",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:34 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This paper describes initial work on a software
                 development environment capable of smoothly integrating
                 modules written in different languages. The focus of
                 this work is on supporting the construction of
                 executable, multi-formalism specifications, where each
                 part of a problem is described in a language that is
                 close to its underlying domain. We distinguish
                 specifications from programs to emphasize the closeness
                 of the formalism to these domains rather than
                 underlying computational models, and to indicate that
                 we are not attempting to integrate existing
                 implementations of programming languages. Rather, we
                 provide a grammar-based framework for the construction
                 and integration of interpreters for different
                 specification formalisms. The key to our approach is
                 that formalisms communicate through grammatically
                 described interfaces. Such interfaces hide incompatible
                 aspects of different formalisms, allowing new
                 combinations of formalisms to be created easily.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Goldberg:1990:RSD,
  author =       "Allen Goldberg",
  title =        "Reusing software developments",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "6",
  pages =        "107--119",
  month =        dec,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/99278.99288",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:34 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Software development environments of the future will
                 be characterized by extensive reuse of previous work.
                 This paper addresses the issue of reusability in the
                 context in which design is achieved by the
                 transformational development of formal specifications
                 into efficient implementations. It explores how an
                 implementation of a modified specification can be
                 realized by replaying the transformational derivation
                 of the original and modifying it as required by changes
                 made to the specification. Our approach is to structure
                 derivations using the notion of tactics, and record
                 derivation histories as an execution trace of the
                 application of tactics. One key idea is that tactics
                 are compositional: higher level tactics are constructed
                 from more rudimentary using defined control primitives.
                 This is similar to the approach used in LCF[12] and
                 NuPRL[1, 8]. Given such a derivation history and a
                 modified specification, the correspondence problem [21,
                 20] addresses how during replay a correspondence
                 between program parts of the original and modified
                 program is established. Our approach uses a combination
                 of name association, structural properties, and
                 associating components to one another by intensional
                 descriptions of objects defined in the transformations
                 themselves. An implementation of a rudimentary replay
                 mechanism for our interactive development system is
                 described. For example with the system we can first
                 derive a program from a specification that computes
                 some basic statistics such as mean, variance, frequency
                 data, etc. The derivation is about 15 steps; it
                 involves deriving an efficient means of computing
                 frequency data, combining loops and selecting data
                 structures. We can then modify the specification by
                 adding the ability to compute the maximum or mode and
                 replay the steps of the previous derivation.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Hart:1990:EDS,
  author =       "C. Frederick Hart and John J. Shilling",
  title =        "An environment for documenting software features",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "6",
  pages =        "120--132",
  month =        dec,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/99278.99289",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:34 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The software engineering environment described in this
                 paper directly addresses the problems of modifying
                 software by explicitly linking software designs to
                 implementations --- localizing and partitioning the
                 portions of the implementation corresponding to
                 distinct features and thus facilitating understanding.
                 The operations of feature extraction and generic
                 feature instantiation implemented in this environment
                 provide mechanisms for partially automating the
                 configuration of software. Software documentation based
                 on the notion of features not only records information
                 on program function and structure but information on
                 how maintenance is to be performed. Furthermore, a
                 design environment supporting features and feature
                 contexts promotes feature-oriented design which means
                 designing for reuse and maintainability.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Yang:1990:PIA,
  author =       "Wuu Yang and Susan Horwitz and Thomas Reps",
  title =        "A program integration algorithm that accommodates
                 semantics-preserving transformations",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "6",
  pages =        "133--143",
  month =        dec,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/99278.99290",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:34 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Given a program Base and two variants, A and B, each
                 created by modifying separate copies of Base, the goal
                 of program integration is to determine whether the
                 modifications interfere, and if they do not, to create
                 an integrated program that includes both sets of
                 changes as well as the portions of Base preserved in
                 both variants. Text-based integration techniques, such
                 as the one used by the UNIX diff3 utility, are
                 obviously unsatisfactory because one has no guarantees
                 about how the execution behavior of the integrated
                 program relates to the behaviors of Base, A, and B. The
                 first program-integration algorithm to provide such
                 guarantees was developed by Horwitz, Prins, and Reps.
                 However, a limitation of that algorithm is that it
                 incorporates no notion of semantics-preserving
                 transformations. This limitation causes the algorithm
                 to be overly conservative in its definition of
                 interference. For example, if one variant changes the
                 way a computation is performed (without changing the
                 values computed) while the other variant adds code that
                 uses the result of the computation, the algorithm would
                 classify those changes as interfering. This paper
                 describes a new integration algorithm that is able to
                 accommodate semantics-preserving transformations.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Snodgrass:1990:FGD,
  author =       "Richard Snodgrass and Karen Shannon",
  title =        "Fine grained data management to achieve evolution
                 resilience in a software development environment",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "6",
  pages =        "144--156",
  month =        dec,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/99278.99291",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:34 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "A software development environment (SDE) exhibits
                 evolution resilience if changes to the SDE do not
                 adversely affect its functionality nor performance, and
                 also do not introduce delays in returning the SDE to an
                 operational state after a change. Evolution resilience
                 is especially difficult to achieve when manipulating
                 fine grained data, which must be tightly bound to the
                 language in which the SDE is implemented to achieve
                 adequate performance. We examine a spectrum of
                 approaches to tool integration that range from high
                 SDE-development-time efficiency to high
                 SDE-execution-time efficiency. We then present a
                 meta-environment, a specific SDE tailored to the
                 development of target SDE's, that supports easy
                 movement of individual tools along this spectrum.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Lockman:1990:PTT,
  author =       "Abe Lockman and John Salasin",
  title =        "A procedure and tools for transition engineering",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "6",
  pages =        "157--172",
  month =        dec,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/99278.99292",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:34 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Kobialka:1990:CEG,
  author =       "Hans-Ulrich Kobialka",
  title =        "Configuration editing, generation and test within
                 working contexts",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "6",
  pages =        "173--182",
  month =        dec,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/99278.99293",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:34 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "In a software development environment any progress is
                 reflected in modifications of design documents. These
                 changes must be attended by recording of versions in
                 order to restore consistent states and to rebuild
                 delivered systems for error detection. The introduction
                 of versions implies the need for version selection
                 mechanisms, to achieve the same degree of operability
                 as known in versionless environments. This paper
                 introduces a version selection mechanism based on the
                 notion of working contexts. Examples generated by the
                 ADD document management system illustrate how editing,
                 generation and test of configurations are eased using
                 working contexts.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Ambriola:1990:SPE,
  author =       "V. Ambriola and P. Ciancarini and C. Montangero",
  title =        "Software process enactment in Oikos",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "6",
  pages =        "183--192",
  month =        dec,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/99278.99294",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:34 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Despite much research work in progress to model the
                 different facets of software process enactment from
                 different approaches, there are no models yet generally
                 recognized as adequate, and there is need for more
                 experimentation. We describe the Oikos environment and
                 its coordination language ESP: they provide an
                 infrastructure in which experiments may be performed
                 and evaluated. Oikos predefines a number of services
                 offering basic facilities, like access to data bases,
                 workspaces, user interfaces etc.. Services are
                 customizable, in a declarative way that matches
                 naturally the way ESP defines and controls the software
                 process. ESP allows to define services, to structure
                 them in a dynamic hierarchy, and to coordinate them
                 according to the blackboard paradigm. The concepts of
                 environment and of software process and their interplay
                 are naturally characterized in Oikos, in terms of sets
                 of services and of the hierarchy. In the paper, an
                 example taken from a real project (the specification of
                 a small language and the implementation of its
                 compiler) shows how Oikos and ESP are effective for
                 software process enactment. As it is, ESP embeds Prolog
                 as its sequential component, and combines it smoothly
                 to the blackboard approach to deal with concurrency and
                 distribution. Anyway, most of the concepts used to
                 model and enact software processes are largely
                 independent of logic programming.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Gruhn:1990:MSP,
  author =       "Volker Gruhn",
  title =        "Managing software processes in the environment
                 {MELMAC}",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "6",
  pages =        "193--205",
  month =        dec,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/99278.99295",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:34 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "In this paper we introduce an approach to software
                 process modeling and execution based on the distinction
                 between an application level (oriented towards a
                 comprehensive representation of software process
                 models) and an intermediate level representation of
                 software process models (oriented towards uniform and
                 executable description of software process models). The
                 application level representation of software models
                 identifies various entities of software process models.
                 For describing different entities of software process
                 models different views are used. The entities specified
                 within all the views are uniformly represented on the
                 intermediate level by FUNSOFT nets. FUNSOFT nets are
                 high-level Petri nets which are adapted to the
                 requirements of software process management. A
                 mechanism for coping with software process model
                 modifications raised in software process execution is
                 introduced. This mechanism is based on modification
                 points. Moreover, we discuss the architecture of the
                 environment MELMAC which supports software process
                 modeling as well as software process execution.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Sutton:1990:LCM,
  author =       "Stanley M. {Sutton, Jr.} and Dennis Heimbigner and
                 Leon J. Osterweil",
  title =        "Language constructs for managing change in
                 process-centered environments",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "6",
  pages =        "206--217",
  month =        dec,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/99278.99296",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:34 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Change is pervasive during software development,
                 affecting objects, processes, and environments. In
                 process centered environments, change management can be
                 facilitated by software-process programming, which
                 formalizes the representation of software products and
                 processes using software-process programming languages
                 (SPPLs). To fully realize this goal SPPLs should
                 include constructs that specifically address the
                 problems of change management. These problems include
                 lack of representation of inter-object relationships,
                 weak semantics for inter-object relationships,
                 visibility of implementations, lack of formal
                 representation of software processes, and reliance on
                 programmers to manage change manually. APPL/A is a
                 prototype SPPL that addresses these problems. APPL/A is
                 an extension to Ada.. The principal extensions include
                 abstract, persistent relations with programmable
                 implementations, relation attributes that may be
                 composite and derived, triggers that react to relation
                 operations, optionally-enforceable predicates on
                 relations, and five composite statements with
                 transaction-like capabilities. APPL/A relations and
                 triggers are especially important for the problems
                 raised here. Relations enable inter-object
                 relationships to be represented explicitly and
                 derivation dependencies to be maintained automatically.
                 Relation bodies can be programmed to implement
                 alternative storage and computation strategies without
                 affecting users of relation specifications. Triggers
                 can react to changes in relations, automatically
                 propagating data, invoking tools, and performing other
                 change management tasks. Predicates and the
                 transaction-like statements support change management
                 in the face of evolving standards of consistency.
                 Together, these features mitigate many of the problems
                 that complicate change management in software processes
                 and process-centered environments.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Ossher:1990:SCR,
  author =       "Harold Ossher and William Harrison",
  title =        "Support for change in {RPDE3}",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "6",
  pages =        "218--228",
  month =        dec,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/99278.99297",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:34 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "RPDE$^3$ is a framework for building environments.
                 Great emphasis has been placed on supporting changes of
                 various kinds, such as extensions to existing
                 environments and creation of new environments by
                 adapting existing environments. We have a three-pronged
                 approach to supporting change: (1) use of a central
                 framework providing key services is a uniform fashion,
                 (2) an extended object-oriented programming paradigm
                 supporting fine-grained changes by addition of small
                 code fragments, and (3) structured representation of
                 program material facilitating sophisticated
                 language-sensitive processing. RPDE$^3$ has been used
                 on a daily basis for its own development for about
                 three years now, and during that time has undergone
                 extensive change. This experience has indicated
                 strongly that our approach to supporting change is
                 effective, and has identified extensions to it that
                 should make it more effective still. This paper
                 describes the approach and, primarily, our
                 experience.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Mahler:1990:ICM,
  author =       "Axel Mahler and Andreas Lampen",
  title =        "Integrating configuration management into a generic
                 environment",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "6",
  pages =        "229--237",
  month =        dec,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/99278.99298",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:34 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The software development process consists of a number
                 of complex activities for work coordination,
                 organization, communication, and disciplines that are
                 essential for achieving quality software, maintaining
                 system integrity, and keeping the software process
                 manageable. Software Engineering Environments can be
                 helpful instruments in pursuing these goals when they
                 are integrated, open to extension, and capable of
                 adapting to real processes as they occur in software
                 development projects. Adaptability and the ability to
                 perform adaptations rapidly are crucial features of
                 SEEs. In this paper we are presenting an approach to
                 rapid environment extension that provides the means to
                 capture characteristics of software development
                 processes and realize environment support for these
                 processes by using existing tools. An object oriented
                 environment infrastructure is the basis for achieving
                 these goals while providing and maintaining an
                 integrated behavior of the environment. The presented
                 approach is demonstrated by defining a set of classes
                 for version control and configuration management that
                 model the behavior of an existing configuration
                 management toolkit.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Tedjini:1990:QSS,
  author =       "Mohamed Tedjini and Ian Thomas and Guy Benoliel and
                 Fernando Gallo and R{\'e}gis Minot",
  title =        "A query service for a software engineering database
                 system",
  journal =      j-SIGSOFT,
  volume =       "15",
  number =       "6",
  pages =        "238--248",
  month =        dec,
  year =         "1990",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/99278.99299",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:34 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The PCTE interfaces define a Public Tool Interface
                 intended to serve as a basis for the construction of
                 integrated software engineering environments (SEEs).
                 The interfaces include Object Management System (OMS)
                 services that manage the data repository of the
                 environment. The OMS is based on a binary
                 Entity-Relationship model. This paper describes a query
                 service constructed on the PCTE interfaces. Following a
                 brief summary of the OMS features that are necessary to
                 understand the paper, we describe the requirements and
                 design objectives for a query service in an integrated
                 SEE, the basic model for our solution, and then review
                 the facilities of the service. The paper also contains
                 a comparison with other work on queries on E-R and
                 object-oriented databases. The paper's conclusions
                 indicate the differences that exist between
                 requirements and characteristics for query services on
                 SEE data repositories and those for other databases. It
                 shows, for example, how assumptions about data
                 availability and accessibility that are often made for
                 query services are not appropriate for SEE data
                 repositories.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Wei:1991:MCU,
  author =       "Yin-min Wei and Klaus Eldridge",
  title =        "Module Completeness as a Useful Guideline for
                 Programming",
  journal =      j-SIGSOFT,
  volume =       "16",
  number =       "1",
  pages =        "35",
  month =        jan,
  year =         "1991",
  CODEN =        "SFENDP",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:36 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Scarlato:1991:DAS,
  author =       "Philip P. Scarlato",
  title =        "Developing {Ada} software without target hardware",
  journal =      j-SIGSOFT,
  volume =       "16",
  number =       "1",
  pages =        "36--40",
  month =        jan,
  year =         "1991",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/126496.126497",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:36 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/adabooks.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "An analysis of several of the Ada software projects
                 recently completed at the E-Systems ECI Division
                 reveals that although the software is very target
                 specific, a large portion of this software could be
                 developed independent of the target hardware. Only a
                 very small portion of this software could not be
                 developed in some way without the physical target
                 hardware. However, it seems that the projects that
                 experienced the most difficulty in completing the
                 software task had a large portion of the software that
                 was target test dependent. To visualize this software
                 development difficulty, the target test dependent
                 portion of software can be thought of as the small
                 portion of an iceberg's mass that is visible above the
                 water line as illustrated in figure 1 --- the greater
                 the mass above the water line, the greater the overall
                 mass of the iceberg, the longer the melt down, and the
                 greater the threat to navigation. Therefore, to reduce
                 the overall navigation threat to project completion,
                 this target test dependent software should be limited
                 in a manner that allows the bulk of the iceberg to be
                 verified and fine tuned independent of the target
                 hardware. This paper discusses software development
                 tactics used to reduce the overall risk in developing
                 software for a project in which hardware and software
                 were developed in parallel and access to the target
                 hardware was limited or unavailable until after the
                 majority of the software was developed. These tactics
                 are useful in partitioning the software into a
                 manageable form, can help prevent the creation of
                 duplicate software development, and can allow Computer
                 Software Component (CSC) integration and test of the
                 majority of the software in the host environment before
                 the target hardware becomes available.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Rine:1991:PSS,
  author =       "David C. Rine",
  title =        "A proposed standard set of principles for
                 object-oriented development",
  journal =      j-SIGSOFT,
  volume =       "16",
  number =       "1",
  pages =        "43--49",
  month =        jan,
  year =         "1991",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/126496.126498",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:36 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Maciaszek:1991:ACR,
  author =       "Leszek A. Maciaszek",
  title =        "{AD}\slash Cycle repository manager from
                 object-oriented perspective",
  journal =      j-SIGSOFT,
  volume =       "16",
  number =       "1",
  pages =        "50--53",
  month =        jan,
  year =         "1991",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/126496.126499",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:36 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The advantage of an object-oriented approach to
                 development is that it offers the analyst, designer and
                 programmer a higher level of abstraction in which to
                 work. AD/Cycle uses object orientation in two contexts:
                 (1) it encourages an object-oriented approach to
                 software production based on AD/Cycle, and (2) it
                 presents itself as an object-oriented database
                 development platform. The former is a methodological
                 issue, the latter --- an environmental issue. The
                 methodological issue is only sketched in AD/Cycle
                 documents, and as such is addressed only briefly in
                 this paper. The main thread of the paper is on the
                 evaluation of the environmental aspect of AD/Cycle.
                 This implies that the paper concentrates on the
                 Repository Manager of AD/Cycle. In particular, the
                 paper examines the conceptual specification view and
                 also the logical specification view combined with
                 run-time services. The conclusions of this paper are
                 only as sound as the object orientation paradigm
                 itself. The paper places special emphasis on this
                 issue. It is believed that object orientation solves
                 the application a nd data management problems faced by
                 CASE developers and users, but hard proof has yet to be
                 provided. The same applies to the claims of
                 productivity improvements in most but particularly
                 susceptible application development activities (such as
                 window management).",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Ducasse:1991:ODEa,
  author =       "Mireille Ducass{\'e} and Anna-Maria Emde",
  title =        "{OPIUM}: a debugging environment for {Prolog}
                 development and debugging research",
  journal =      j-SIGSOFT,
  volume =       "16",
  number =       "1",
  pages =        "54--59",
  month =        jan,
  year =         "1991",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/126496.126500",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:36 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Opium is an extensible debugging environment for
                 PROLOG providing high-level debugging facilities for
                 programmers and debugging experts.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Kamat:1991:CR,
  author =       "Vikas K. Kamat",
  title =        "Code reader",
  journal =      j-SIGSOFT,
  volume =       "16",
  number =       "1",
  pages =        "60--61",
  month =        jan,
  year =         "1991",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/126496.126501",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:36 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Source code reading as an element of Software
                 Engineering has long been ignored. Presented here is a
                 pseudo-design of a Code reader (CREAD) for 'C' like
                 language.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Kirner:1991:RTS,
  author =       "Tereza G. Kirner",
  title =        "Real-time systems specification: a process and a
                 tool",
  journal =      j-SIGSOFT,
  volume =       "16",
  number =       "1",
  pages =        "62--67",
  month =        jan,
  year =         "1991",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/126496.126502",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:36 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Bukovsky:1991:PAS,
  author =       "Nikolay S. Bukovsky",
  title =        "A practical approach to software quality assurance",
  journal =      j-SIGSOFT,
  volume =       "16",
  number =       "1",
  pages =        "68--72",
  month =        jan,
  year =         "1991",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/126496.126503",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:36 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Software quality assurance (SQA) has been recognized
                 as an effective approach to quality problems. This
                 paper reflects INTERPROGRAMA Institute's experience in
                 developing and implementing a SQA program. Topics to be
                 discussed will include: Phased approach to SQA
                 implementation; Management and organization of SQA;
                 Quality measurement; Quality control procedures;
                 Quality measurement tools; Developers' participation in
                 SQA; Anomaly reporting; Quality planning; Defects
                 analysis; INTERPROGRAMA's practical experience and
                 results.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Lai:1991:ATT,
  author =       "Robert Chi Tau Lai",
  title =        "{Ada} task taxonomy support for concurrent
                 programming",
  journal =      j-SIGSOFT,
  volume =       "16",
  number =       "1",
  pages =        "73--91",
  month =        jan,
  year =         "1991",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/126496.126504",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:36 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/adabooks.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The Ada task taxonomy can be used as the main scheme
                 to help programmers to develop concurrent programs. The
                 conventional way of defining a taxonomy for software
                 modules is not based on the interactive behavior of the
                 modules. The behavior of Ada tasks is more dynamic than
                 that of other Ada modules such as procedures, functions
                 and packages. By classifying sets of tasks by their
                 interactive characteristics, functions, and procedural
                 behaviors, a task taxonomy can be formulated. Task
                 taxonomy can be used as an abstraction for software
                 developers to design, store, and retrieve concurrent
                 systems and reusable parts. A set of tools based on
                 characteristics formally representing kinds of tasks
                 can be designed. This set of tools will help
                 programmers define their own task taxonomies for
                 designing, constructing, and maintaining concurrent
                 systems.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Neumann:1991:RPCa,
  author =       "Peter G. Neumann",
  title =        "Risks to the public in computers and related systems",
  journal =      j-SIGSOFT,
  volume =       "16",
  number =       "2",
  pages =        "4--18",
  month =        apr,
  year =         "1991",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/122538.122539",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:37 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{DeTreville:1991:CT,
  author =       "John DeTreville",
  title =        "A cautionary tale",
  journal =      j-SIGSOFT,
  volume =       "16",
  number =       "2",
  pages =        "19--22",
  month =        apr,
  year =         "1991",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/122538.122540",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:37 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Lyu:1991:PRD,
  author =       "Michael Lyu",
  title =        "{PANEL}: research and development issues in software
                 reliability engineering",
  journal =      j-SIGSOFT,
  volume =       "16",
  number =       "2",
  pages =        "23--30",
  month =        apr,
  year =         "1991",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/122538.122541",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:37 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Kilov:1991:CCE,
  author =       "Haim Kilov",
  title =        "Conventional and convenient in entity-relationship
                 modeling",
  journal =      j-SIGSOFT,
  volume =       "16",
  number =       "2",
  pages =        "31--32",
  month =        apr,
  year =         "1991",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/122538.122542",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:37 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Waters:1991:TDA,
  author =       "Richard C. Waters and Yang Meng Tan",
  title =        "Toward a design apprentice: supporting reuse and
                 evolution in software design",
  journal =      j-SIGSOFT,
  volume =       "16",
  number =       "2",
  pages =        "33--34",
  month =        apr,
  year =         "1991",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/122538.122543",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:37 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Peterson:1991:CTS,
  author =       "A. Spencer Peterson",
  title =        "Coming to terms with software reuse terminology: a
                 model-based approach",
  journal =      j-SIGSOFT,
  volume =       "16",
  number =       "2",
  pages =        "45--51",
  month =        apr,
  year =         "1991",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/122538.122544",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:37 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This article attempts to standardize the use of many
                 terms used in the software reuse literature. Three
                 terms of particular interest --- taxonomy, software
                 reuse, and domain analysis --- and some problems with
                 their usage are discussed. The specific problems with
                 these terms are generalized and several solutions are
                 given, the most important being the introduction of the
                 concept of using reuse process models to provide both
                 context and an overall view of the potential areas of
                 discourse in reuse. Several new terms are proposed for
                 future use; definitions of existing terms that are
                 meaningful in the context of software reuse are also
                 included.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Cherry:1991:SCOa,
  author =       "George W. Cherry",
  title =        "Software construction by object-oriented pictures:
                 stimulus-response machines",
  journal =      j-SIGSOFT,
  volume =       "16",
  number =       "2",
  pages =        "52--56",
  month =        apr,
  year =         "1991",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/122538.122545",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:37 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Beckman:1991:DHT,
  author =       "Brian Beckman",
  title =        "Debugging for hypercubes in time warp",
  journal =      j-SIGSOFT,
  volume =       "16",
  number =       "2",
  pages =        "57",
  month =        apr,
  year =         "1991",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/122538.122546",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:37 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Marsh:1991:VPM,
  author =       "Shaun Marsh",
  title =        "The V project manager tools",
  journal =      j-SIGSOFT,
  volume =       "16",
  number =       "2",
  pages =        "58--61",
  month =        apr,
  year =         "1991",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/122538.122548",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:37 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This paper proposes a simple set of tools for managing
                 the concurrent development of a given project by many
                 developers. These tools may be added to most
                 programming environments while not hiding the files
                 from other tools which the developer may wish to use.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Sprague:1991:RSC,
  author =       "Kristopher G. Sprague",
  title =        "The role of software configuration management in a
                 measurement-based software engineering program",
  journal =      j-SIGSOFT,
  volume =       "16",
  number =       "2",
  pages =        "62--66",
  month =        apr,
  year =         "1991",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/122538.122547",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:37 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The role of Software Configuration Management has
                 rapidly expanded and grown in importance over the last
                 few years for a number of reasons. This paper presents
                 an overview of the significant changes that are
                 occurring in the Software Configuration Management
                 discipline with respect to its role in a
                 measurement-based software engineering program. It
                 identifies the changes, provides an overview of the SCM
                 functions, proposes a process, and discusses directions
                 for future research and development.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Ducasse:1991:ODEb,
  author =       "Mireille Ducass{\'e} and Anna-Maria Emde",
  title =        "{OPIUM}: a debugging environment for {Prolog}
                 development and debugging research",
  journal =      j-SIGSOFT,
  volume =       "16",
  number =       "2",
  pages =        "67--72",
  month =        apr,
  year =         "1991",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/122538.122549",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:37 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Opium is an extensible debugging environment for
                 PROLOG providing high-level debugging facilities for
                 programmers and debugging experts.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Morell:1991:IDS,
  author =       "Larry J. Morell and Jeffrey Voas",
  title =        "On the inadequacies of data state space sampling as a
                 measure of the trustworthiness of programs",
  journal =      j-SIGSOFT,
  volume =       "16",
  number =       "2",
  pages =        "73--74",
  month =        apr,
  year =         "1991",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/122538.122550",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:37 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Omar:1991:SSF,
  author =       "A. A. Omar and F. A. Mohammed",
  title =        "A survey of software functional testing methods",
  journal =      j-SIGSOFT,
  volume =       "16",
  number =       "2",
  pages =        "75--82",
  month =        apr,
  year =         "1991",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/122538.122551",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:37 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Functional testing is used to find disagreement
                 between the specifications and the actual
                 implementation of the software systems. The method of
                 representing the specification can help to detect
                 inconsistency and incompleteness in it. The various
                 specification representation schemes are outlined in
                 the paper. The basic technique of functional testing of
                 software systems is the black box technique. This
                 technique generates the test data using the information
                 contained in the program's specification, independent
                 of the implemented program's code. Black box testing
                 cannot discover errors contained in the functions which
                 are not mentioned explicitly in the specification.
                 Therefore, a program dependent testing is necessary to
                 discover this type of errors. The paper surveys the
                 different methods of generating test data for both
                 techniques; the black box and the program dependent
                 techniques.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Neumann:1991:RPCb,
  author =       "Peter G. Neumann",
  title =        "Risks to the public in computers and related systems",
  journal =      j-SIGSOFT,
  volume =       "16",
  number =       "3",
  pages =        "3--28",
  month =        jul,
  year =         "1991",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/127099.127100",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:38 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Knight:1991:PIT,
  author =       "John C. Knight and E. Ann Myers",
  title =        "{Phased} inspections and their implementation",
  journal =      j-SIGSOFT,
  volume =       "16",
  number =       "3",
  pages =        "29--35",
  month =        jul,
  year =         "1991",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/127099.127101",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:38 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Tracz:1991:CMM,
  author =       "Will Tracz",
  title =        "A conceptual model for megaprogramming",
  journal =      j-SIGSOFT,
  volume =       "16",
  number =       "3",
  pages =        "36--45",
  month =        jul,
  year =         "1991",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/127099.127102",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:38 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "`` Currently, software is put together one statement
                 at a time. What we need is to put software together one
                 component at a time.'' --- Barry Boehm, at the Domain
                 Specific Software Architecture (DSSA) Workshop, July
                 11--12, 1990. Megaprogramming, as defined at the first
                 ISTO Software Technology Community Meeting, June 27-29,
                 1990, by Barry Boehm, director of DARPA/ISTO, is
                 component-based software engineering and life-cycle
                 management. The goal of this paper is to place
                 megaprogramming in perspective with research in other
                 areas of software engineering (i.e., formal methods and
                 rapid prototyping) and to describe the author's
                 experience developing a system to support
                 megaprogramming. The paper, first, analyzes
                 megaprogramming and its relationship to other DARPA
                 research initiatives (CPS/CPL --- Common Prototyping
                 System/Common Prototyping Language, DSSA --- Domain
                 Specific Software Architectures, and SWU --- Software
                 Understanding). Next, the desirable attributes of
                 megaprogramming software components are identified and
                 a software development model (The 3C Model) and
                 resulting prototype megaprogramming system (LILEANNA
                 --- Library Interconnection Language Extended by
                 Annotated Ada) are described.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Dolado:1991:SDG,
  author =       "Jos{\'e} Javier Dolado",
  title =        "Structured development of graph-grammars for icon
                 manipulation",
  journal =      j-SIGSOFT,
  volume =       "16",
  number =       "3",
  pages =        "46--51",
  month =        jul,
  year =         "1991",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/127099.127103",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:38 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "In this work we are showing a structured process to
                 build a grammar for icon manipulation. We presuppose
                 that the object to be manipulated in the computer
                 screen can be stated as a set of relations among its
                 parts. We describe a procedure to generate a program
                 that manipulates the object, guaranteeing that only
                 objects with those properties will be constructed, and
                 that every instance of that object is allowable. The
                 formation rules for the object are stored in terms of
                 attributed graph-grammars productions.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Cherry:1991:RMV,
  author =       "George W. Cherry",
  title =        "{S-R} machines: a visual formalism for reactive and
                 interactive systems",
  journal =      j-SIGSOFT,
  volume =       "16",
  number =       "3",
  pages =        "52--55",
  month =        jul,
  year =         "1991",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/127099.127105",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:38 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Wybolt:1991:PCT,
  author =       "Nicholas Wybolt",
  title =        "Perspectives on {CASE} tool integration",
  journal =      j-SIGSOFT,
  volume =       "16",
  number =       "3",
  pages =        "56--60",
  month =        jul,
  year =         "1991",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/127099.127106",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:38 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "CASE tool integration means making the whole tool
                 environment greater than the sum of its constituent
                 parts (tools). An integrated CASE environment, in turn,
                 is built on an integration framework. This paper
                 presents a series of perspectives on CASE tool
                 integration and frameworks.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Prieto-Diaz:1991:MSR,
  author =       "Rub{\'e}n Prieto-D{\'\i}az",
  title =        "Making software reuse work: an implementation model",
  journal =      j-SIGSOFT,
  volume =       "16",
  number =       "3",
  pages =        "61--68",
  month =        jul,
  year =         "1991",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/127099.127107",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:38 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Despite software reuse's promise to significantly
                 improve software quality and productivity, its practice
                 remains elusive. The difficult issues outside the
                 technical realm are seldom addressed. To be practical,
                 reuse must address not only technical but managerial,
                 economic, performance, cultural, and technology
                 transfer issues. A model for implementing software
                 reuse programs is discussed and supported by successful
                 experiences. This model is based on an incremental
                 strategy and addresses the above issues, directly and
                 indirectly. The approach is practical, effective, and
                 has potential to make reuse a regular practice in the
                 software development process. Portions of the model
                 have been used successfully in consulting with SPC
                 member companies.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Yu:1991:VTR,
  author =       "Don Yu",
  title =        "A view on three {R}'s ({3Rs}): reuse, re-engineering,
                 and reverse-engineering",
  journal =      j-SIGSOFT,
  volume =       "16",
  number =       "3",
  pages =        "69",
  month =        jul,
  year =         "1991",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/127099.127109",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:38 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Buckley:1991:PAS,
  author =       "Fletcher J. Buckley",
  title =        "Perestroika, anyone? {A} standard for democracy in
                 professional organizations",
  journal =      j-SIGSOFT,
  volume =       "16",
  number =       "3",
  pages =        "70--72",
  month =        jul,
  year =         "1991",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/127099.127111",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:38 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The IEEE Computer Society has been recently taken to
                 task for being an ``old boys'' club. Response to these
                 kind of attacks can sometimes be to raise the
                 drawbridge, drop the portcullis and man the
                 battlements. Sometimes, however, it is more productive
                 to sift through the muck and the mire, take a look at
                 the facts and see if a real problem exists. In this
                 particular case, as Al Smith used to say, let's take a
                 look at the record.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{MacAuslan:1991:CDH,
  author =       "Joel MacAuslan",
  title =        "Comments on debugging hypercubes in a {von Neumann}
                 language",
  journal =      j-SIGSOFT,
  volume =       "16",
  number =       "3",
  pages =        "73",
  month =        jul,
  year =         "1991",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/127099.127113",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:38 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Foster:1991:AST,
  author =       "Kenneth A. Foster",
  title =        "Arithmetic statement testing",
  journal =      j-SIGSOFT,
  volume =       "16",
  number =       "3",
  pages =        "74--77",
  month =        jul,
  year =         "1991",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/127099.127115",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:38 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Tripp:1991:RFS,
  author =       "Leonard L. Tripp",
  title =        "Report on future software engineering standards
                 direction",
  journal =      j-SIGSOFT,
  volume =       "16",
  number =       "3",
  pages =        "77",
  month =        jul,
  year =         "1991",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/127099.127117",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:38 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Musa:1991:PAR,
  author =       "John D. Musa",
  title =        "Performance analysis rat holes to avoid or how to
                 stall a performance presentation",
  journal =      j-SIGSOFT,
  volume =       "16",
  number =       "3",
  pages =        "78",
  month =        jul,
  year =         "1991",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/127099.127119",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:38 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Musa:1991:RFE,
  author =       "John D. Musa",
  title =        "Rationale for fault exposure ratio {$K$}",
  journal =      j-SIGSOFT,
  volume =       "16",
  number =       "3",
  pages =        "79",
  month =        jul,
  year =         "1991",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/127099.127121",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:38 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Musa:1991:ETN,
  author =       "John D. Musa and A. Iannino",
  title =        "Estimating the total number of software failures using
                 an exponential model",
  journal =      j-SIGSOFT,
  volume =       "16",
  number =       "3",
  pages =        "80--84",
  month =        jul,
  year =         "1991",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/127099.127123",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:38 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Different approaches to estimating the total number of
                 failures parameter for the Jelinski-Moranda model are
                 considered. The maximum likelihood estimator, a
                 harmonic jackknife maximum likelihood estimator, and a
                 simple Bayesian estimator are studied. None of these is
                 found to be entirely satisfactory, each suffering from
                 either infinite estimates and/or severe bias in small
                 to moderate samples. The purpose of this paper is to
                 summarize this work, in order to stimulate a search for
                 better estimators.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Saradhi:1991:SDP,
  author =       "Motamarri Saradhi",
  title =        "Systems deployment planning and scheduling",
  journal =      j-SIGSOFT,
  volume =       "16",
  number =       "3",
  pages =        "85--87",
  month =        jul,
  year =         "1991",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/127099.127124",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:38 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "In any large scale Systems Development activity, it is
                 unlikely that the whole application system is ready at
                 a time for deployment/launching to live action. In case
                 of turnkey projects the situation is much more
                 critical. Added to this there can be situations in
                 which, the implementation of design and deployment of
                 application system may have to go in tandem. As the
                 Systems Development Life Cycle does not include these,
                 the Project Management within that constrained
                 framework may likely face enormous setbacks. I have
                 realised these issues in the process of a turnkey
                 computerisation project for a large Thrift and Credit
                 Co-Operative Society application. The paper aims at
                 elaborating the role of Systems Deployment Planning and
                 Scheduling for successful Systems Development and
                 Deployment in such situations.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Lindquist:1991:OVT,
  author =       "Timothy E. Lindquist and Kurt M. Gutzmann and David L.
                 Remkes and Gary McKee",
  title =        "Optimization of validation test suite coverage",
  journal =      j-SIGSOFT,
  volume =       "16",
  number =       "3",
  pages =        "87--92",
  month =        jul,
  year =         "1991",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/127099.127126",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:38 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Test coverage is an important aspect of a validation
                 suite for implementations of a standard such as the
                 CAIS. This paper presents the development and
                 application of a constrained optimization process for
                 CAIS test coverage. Subjective criteria and goals
                 combined with objective measures of test coverage
                 derived from information models yield a
                 quasi-quantitative figure of merit for test objectives.
                 The approach next identifies resource (time and effort)
                 and process constraints. A greedy algorithm provides a
                 partial solution to the coverage design problem. The
                 decreasing first fit bin packing heuristic then refines
                 the coverage measure of the validation test suite
                 within the process constraints. Finally, the paper
                 presents the results of the application test selection
                 and optimization process to the design of the CIVC-A
                 test suite.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Smith:1991:QAT,
  author =       "Richard E. Smith",
  title =        "Quality assurance through direct implementation of
                 analysis and design constructs",
  journal =      j-SIGSOFT,
  volume =       "16",
  number =       "3",
  pages =        "93--94",
  month =        jul,
  year =         "1991",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/127099.127128",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:38 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "A measurably good design does not guarantee a
                 correspondingly good implementation. When an
                 implementer translates a software design into the
                 implementation language. We weaken the correspondence
                 between the measured capabilities of the design and the
                 implementation. This can lead to a failure to achieve
                 goals that the design originally assured. We can avoid
                 such failures if we transform the exad models and
                 structures from the analysis and design phase into
                 software components of the implementation. This paper
                 presents a practitioners efforts to integrate realtime
                 software implementation with the abstractions used in
                 system analysis and design. Our approach as been to
                 adapt existing paradigms and took to achieve this
                 effect. We have applied this to three real time
                 software projects using techniques such as object
                 oriented analysis and data low design.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Boundy:1991:TP,
  author =       "David Boundy",
  title =        "A taxonomy of programmers",
  journal =      j-SIGSOFT,
  volume =       "16",
  number =       "4",
  pages =        "23--30",
  month =        oct,
  year =         "1991",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/122552.122553",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:39 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{vonMayrhauser:1991:TED,
  author =       "Anneliese von Mayrhauser",
  title =        "Testing and evolutionary development",
  journal =      j-SIGSOFT,
  volume =       "16",
  number =       "4",
  pages =        "31--36",
  month =        oct,
  year =         "1991",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/122552.122554",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:39 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Shimomura:1991:ARM,
  author =       "Takao Shimomura",
  title =        "Automatic resumption mechanism for program debugging",
  journal =      j-SIGSOFT,
  volume =       "16",
  number =       "4",
  pages =        "37--41",
  month =        oct,
  year =         "1991",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/122552.122555",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:39 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "In program debugging, tracing control instructions
                 that examine internal program states can be saved in a
                 file and this file can be used to initialize the
                 debugging environment when a program is loaded by a
                 debugger. When a source program is modified because of
                 bugs, however, source line numbers are also changed. It
                 is therefore necessary to update the source line
                 numbers in a tracing control instruction file according
                 to the modifications in the source program. This paper
                 proposes a solution by means of an automatic resumption
                 mechanism that simplifies the debugging procedure from
                 source modification to the beginning of the next
                 debugging. While a programmer is creating an executable
                 program using make after he has modified the program,
                 the tracing control instruction file is updated
                 automatically, so the programmer does not even have to
                 think of updating them. This mechanism makes it very
                 easy to resume debugging with the same debugging
                 environment after program modification.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Cherry:1991:SCOb,
  author =       "George W. Cherry",
  title =        "System construction with object-oriented pictures",
  journal =      j-SIGSOFT,
  volume =       "16",
  number =       "4",
  pages =        "42--52",
  month =        oct,
  year =         "1991",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/122552.122556",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:39 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This paper describes the process guide, behavior
                 model, icons, and diagrams of SCOOP-3, a pictorial
                 method for developing reactive systems. SCOOP-3's
                 semantics are Concurrent C++ or Ada: its icons and
                 diagrams are mechanically translatable to these
                 languages. SCOOP-3's process guide supports reuse,
                 prototyping, and concurrent specification and design.
                 Its behavior model (S-R Machines) integrates the
                 notions of finite and infinite automata, data
                 abstractions, and objects. My earlier notes in SEN
                 demonstrated the Finite State Automata power of S-R
                 Machines. This note demonstrates their far greater
                 power and expressiveness. SCOOP-3's black box, machine,
                 and clear box diagrams have the same objective (and
                 names!) as Mills' Box-Structured approach: stepwise
                 provable specifications and designs.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{McLaughlin:1991:SNP,
  author =       "Robert McLaughlin",
  title =        "Some notes on program design",
  journal =      j-SIGSOFT,
  volume =       "16",
  number =       "4",
  pages =        "53--54",
  month =        oct,
  year =         "1991",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/122552.122557",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:39 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Program design is an important part of the design
                 process. The propose of this paper is to give some
                 guidelines to the design process. It is not possible to
                 write down a set of rules that will deal with all
                 design problems. However it is possible to make program
                 design a respected science within the computer
                 sciences.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Hughes:1991:MSE,
  author =       "David K. Hughes",
  title =        "Multilingual software engineering using {Ada} and
                 {C}",
  journal =      j-SIGSOFT,
  volume =       "16",
  number =       "4",
  pages =        "55--59",
  month =        oct,
  year =         "1991",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/122552.122558",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:39 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/adabooks.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The technique necessary to interface one software
                 language with another is not clearly defined. The
                 significant increase in the size and complexity of
                 embedded systems and the time and cost constraints
                 imposed by both government and the market place require
                 that software engineers develop a better understanding
                 of the problems of multilingual software
                 implementation. This paper focuses on the technique
                 necessary to successfully interface the Ada* language
                 with the C language in homogeneous or embedded computer
                 systems. These two languages should dominate the
                 software development arena for at least the next
                 decade: Ada, because it is mandated by Federal law to
                 be used in all Department of Defense contracts which
                 require software, and C because it is the
                 implementation language of choice for the vast majority
                 of commercial off-the-shelf software systems.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Rine:1991:SOH,
  author =       "David C. Rine",
  title =        "A short overview of a history of software maintenance:
                 as it pertains to reuse",
  journal =      j-SIGSOFT,
  volume =       "16",
  number =       "4",
  pages =        "60--63",
  month =        oct,
  year =         "1991",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/122552.122559",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:39 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Kokol:1991:SSM,
  author =       "Peter Kokol and Bruno Stiglic and Viljem Zumer",
  title =        "Soft system methodology and is research: development
                 of a new is design paradigm evaluation approach",
  journal =      j-SIGSOFT,
  volume =       "16",
  number =       "4",
  pages =        "64--66",
  month =        oct,
  year =         "1991",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/122552.122560",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:39 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "A sound and complete evaluation is a necessity in
                 efficient and effective information system design. In
                 the present paper we show how the Checklands Soft
                 System Methodology can be used in the development of a
                 new evaluation process, in the manner to overcome some
                 of the greatest weaknesses of conventional ones.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Rushby:1991:FVA,
  author =       "John Rushby and Friedrich von Henke",
  title =        "Formal verification of algorithms for critical
                 systems",
  journal =      j-SIGSOFT,
  volume =       "16",
  number =       "5",
  pages =        "1--15",
  month =        dec,
  year =         "1991",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/123041.123044",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:40 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Atlee:1991:SBM,
  author =       "Joanne Atlee and John Gannon",
  title =        "State-based model checking of event-driven system
                 requirements",
  journal =      j-SIGSOFT,
  volume =       "16",
  number =       "5",
  pages =        "16--28",
  month =        dec,
  year =         "1991",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/123041.123047",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:40 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Dandanell:1991:RDU,
  author =       "Bent Dandanell",
  title =        "Rigorous development using {RAISE}",
  journal =      j-SIGSOFT,
  volume =       "16",
  number =       "5",
  pages =        "29--43",
  month =        dec,
  year =         "1991",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/123041.123049",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:40 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Hansen:1991:SVR,
  author =       "Kirsten M. Hansen and Anders P. Ravn and Hans
                 Rischel",
  title =        "Specifying and verifying requirements of real-time
                 systems",
  journal =      j-SIGSOFT,
  volume =       "16",
  number =       "5",
  pages =        "44--54",
  month =        dec,
  year =         "1991",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/123041.123051",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:40 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Sogaard-Anderson:1991:SKD,
  author =       "J{\o}rgen F. S{\o}gaard-Anderson and Camilla
                 {\O}sterberg Rump and Hans Henrik L{\o}vengreen",
  title =        "A systematic kernel development",
  journal =      j-SIGSOFT,
  volume =       "16",
  number =       "5",
  pages =        "55--65",
  month =        dec,
  year =         "1991",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/123041.123053",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:40 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Butler:1991:IEQ,
  author =       "Ricky W. Butler and George B. Finelli",
  title =        "The infeasibility of experimental quantification of
                 life-critical software reliability",
  journal =      j-SIGSOFT,
  volume =       "16",
  number =       "5",
  pages =        "66--76",
  month =        dec,
  year =         "1991",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/123041.123054",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:40 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Frankl:1991:AFD,
  author =       "Phyllis G. Frankl and Elaine J. Weyuker",
  title =        "Assessing the fault-detecting ability of testing
                 methods",
  journal =      j-SIGSOFT,
  volume =       "16",
  number =       "5",
  pages =        "77--91",
  month =        dec,
  year =         "1991",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/123041.123056",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:40 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Issarny:1991:EHM,
  author =       "Val{\'e}rie Issarny",
  title =        "An exception handling model for parallel programming
                 and its verification",
  journal =      j-SIGSOFT,
  volume =       "16",
  number =       "5",
  pages =        "92--100",
  month =        dec,
  year =         "1991",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/123041.123058",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:40 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Cameron:1991:RTT,
  author =       "E. Jane Cameron and Yow-Jian Lin",
  title =        "A real-time transition model for analyzing behavioral
                 compatibility of telecommunications services",
  journal =      j-SIGSOFT,
  volume =       "16",
  number =       "5",
  pages =        "101--111",
  month =        dec,
  year =         "1991",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/123041.123059",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:40 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Ratel:1991:PVC,
  author =       "Christophe Ratel and Nicolas Halbwachs and Pascal
                 Raymond",
  title =        "Programming and verifying critical systems by means of
                 the synchronous data-flow language {LUSTRE}",
  journal =      j-SIGSOFT,
  volume =       "16",
  number =       "5",
  pages =        "112--119",
  month =        dec,
  year =         "1991",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/123041.123062",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:40 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Kurki-Suonio:1991:SDR,
  author =       "Reino Kurki-Suonio",
  title =        "Stepwise design of real-time systems",
  journal =      j-SIGSOFT,
  volume =       "16",
  number =       "5",
  pages =        "120--131",
  month =        dec,
  year =         "1991",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/123041.123063",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:40 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Xu:1991:STC,
  author =       "Jia Xu and David Lorge Parnas",
  title =        "On satisfying timing constraints in hard-real-time
                 systems",
  journal =      j-SIGSOFT,
  volume =       "16",
  number =       "5",
  pages =        "132--146",
  month =        dec,
  year =         "1991",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/123041.123066",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:40 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Wang:1991:AAB,
  author =       "Chih-Kan Wang and Duu-Chung Tsou and Rwo-Hsi Wang and
                 James C. Browne and Aloysius K. Mok",
  title =        "Automated analysis of bounded response time for two
                 {NASA} expert systems",
  journal =      j-SIGSOFT,
  volume =       "16",
  number =       "5",
  pages =        "147--161",
  month =        dec,
  year =         "1991",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/123041.123067",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:40 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Neumann:1992:IRP,
  author =       "Peter G. Neumann",
  title =        "Illustrative risks to the public in the use of
                 computer systems and related technology",
  journal =      j-SIGSOFT,
  volume =       "17",
  number =       "1",
  pages =        "23--32",
  month =        jan,
  year =         "1992",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/134292.134293",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:41 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Griswold:1992:CAV,
  author =       "William G. Griswold and David Notkin",
  title =        "Computer-aided vs. manual program restructuring",
  journal =      j-SIGSOFT,
  volume =       "17",
  number =       "1",
  pages =        "33--41",
  month =        jan,
  year =         "1992",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/134292.134294",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:41 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Restructuring a software system as it evolves promises
                 to reduce associated maintenance costs. To simplify
                 restructuring, we have developed a tool that preserves
                 the meaning of a program as the engineer applies
                 structural transformations. To help evaluate the
                 prototype tool and its underlying approach, we ran an
                 experiment to compare how people using standard editing
                 tools restructure a program against the computer-aided
                 style that our tool supports. We drew three conclusions
                 from the experiment. First, the subjects generally used
                 a mix of copy/paste and cut/paste editing paradigms;
                 our tool gives the engineer the safety of copy/paste
                 and the speed of cut/paste. Second, most of the
                 subjects made mistakes, including simple syntactic
                 errors and semantic errors (such as not updating the
                 call site after modifying a function definition); our
                 tool avoids errors by the engineer using compensation
                 (for instance, it automatically updates call sites when
                 a procedure definition is changed) or by signalling an
                 error. Third, manual restructuring tends to be
                 haphazard, with engineers handling the order of
                 changes, testing, etc. in inconsistent and potentially
                 error-prone ways; by separating restructuring from
                 functional maintenance and by ensuring preservation of
                 meaning during restructuring, our approach can make the
                 maintenance process more orderly.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{vanReeken:1992:SNP,
  author =       "A. J. van Reeken",
  title =        "Some notes on program design",
  journal =      j-SIGSOFT,
  volume =       "17",
  number =       "1",
  pages =        "42",
  month =        jan,
  year =         "1992",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/134292.134295",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:41 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  note =         "See reply \cite{McLaughlin:1992:SNS}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Matthews:1992:WWB,
  author =       "Peter J. D. Matthews",
  title =        "When to white box test",
  journal =      j-SIGSOFT,
  volume =       "17",
  number =       "1",
  pages =        "43",
  month =        jan,
  year =         "1992",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/134292.134296",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:41 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Finkelsteiin:1992:RE,
  author =       "Anthony Finkelsteiin",
  title =        "Requirements engineering",
  journal =      j-SIGSOFT,
  volume =       "17",
  number =       "1",
  pages =        "45--47",
  month =        jan,
  year =         "1992",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/134292.134297",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:41 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Leveson:1992:FM,
  author =       "Nancy Leveson",
  title =        "Formal methods",
  journal =      j-SIGSOFT,
  volume =       "17",
  number =       "1",
  pages =        "49--50",
  month =        jan,
  year =         "1992",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/134292.134298",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:41 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Schaefer:1992:DMS,
  author =       "Wilhelm Schaefer",
  title =        "Design methods and software processes",
  journal =      j-SIGSOFT,
  volume =       "17",
  number =       "1",
  pages =        "50--51",
  month =        jan,
  year =         "1992",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/134292.134302",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:41 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Jian:1992:MAF,
  author =       "Lu Jian",
  title =        "A method of acquiring formal specifications from
                 examples",
  journal =      j-SIGSOFT,
  volume =       "17",
  number =       "1",
  pages =        "52--56",
  month =        jan,
  year =         "1992",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/134292.134299",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:41 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The acquisition of the formal specification is very
                 important in software development automation. This
                 paper presents a method which combines the concept
                 formation and the antecedent derivation mechanism to
                 accomplish the automatic acquisition of the formal
                 specification from the example specification and the
                 plausibility of the generated formal specification is
                 guaranteed in some sense.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Rine:1992:ECT,
  author =       "David Rine",
  title =        "{EIFFEL}: a case tool supporting object-oriented
                 software construction",
  journal =      j-SIGSOFT,
  volume =       "17",
  number =       "1",
  pages =        "57",
  month =        jan,
  year =         "1992",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/134292.134300",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:41 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Tripp:1992:WFS,
  author =       "Leonard L. Tripp",
  title =        "What is the future of software engineering standards?:
                 discussion paper",
  journal =      j-SIGSOFT,
  volume =       "17",
  number =       "1",
  pages =        "58--61",
  month =        jan,
  year =         "1992",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/134292.134301",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:41 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Henderson-Sellers:1992:CCO,
  author =       "B. Henderson-Sellers and C. Freeman",
  title =        "Cataloguing and classification for object libraries",
  journal =      j-SIGSOFT,
  volume =       "17",
  number =       "1",
  pages =        "62--64",
  month =        jan,
  year =         "1992",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/134292.134303",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:41 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Reusable object classes are seen as a major benefit of
                 adopting the object-oriented paradigm in the commercial
                 data processing and applications programming worlds.
                 However, without some efficient and effective method of
                 locating previously written classes, this benefit of
                 reuse will be lost. Code location requires the classes
                 to be stored in some retrievable fashion. Such an
                 underlying classification system, together with an
                 associated cataloguing system, appropriate for object
                 libraries, is proposed.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Wiener:1992:TRS,
  author =       "Lauren Wiener",
  title =        "A trip report on {SIGSOFT} '91",
  journal =      j-SIGSOFT,
  volume =       "17",
  number =       "2",
  pages =        "23--38",
  month =        apr,
  year =         "1992",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/130840.130841",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:42 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Scott:1992:CSE,
  author =       "Gregory J. Scott",
  title =        "Can software engineering afford to improve the
                 process?",
  journal =      j-SIGSOFT,
  volume =       "17",
  number =       "2",
  pages =        "39--42",
  month =        apr,
  year =         "1992",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/130840.130842",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:42 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The purpose of this paper is to raise questions and
                 generate discussion within the software engineering
                 community about the potential impact of software
                 engineering process improvements. This paper begins by
                 providing a few facts about software engineering
                 economics and process improvement benefits followed by
                 three views of those facts: the traditional cost
                 savings perspective; a software engineer's perspective;
                 and a government contractor's perspective. In the last
                 two perspectives, the questions of what is in this for
                 me and is it in my best interests to support process
                 improvement are asked. The conclusion of this paper is
                 that apparently significant changes must be made in the
                 business culture before process improvements can hope
                 to occur.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Connors:1992:SDM,
  author =       "Danny T. Connors",
  title =        "Software development methodologies and traditional and
                 modern information systems",
  journal =      j-SIGSOFT,
  volume =       "17",
  number =       "2",
  pages =        "43--49",
  month =        apr,
  year =         "1992",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/130840.130843",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:42 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Considerable discussion exists about the proper
                 methodology for developing software. Some individuals
                 favor a strict step-by-step approach, while others
                 favor rapid prototyping. The extra dimensions of newer
                 information systems such as Decision Support Systems
                 and Expert Systems add to the confusion. Many
                 individuals believe that new systems need new
                 methodologies. This paper surveys the literature to
                 determine current philosophies concerning traditional
                 and modern information systems. Then, a typology which
                 integrates the philosophies into a model useful for
                 selecting an appropriate methodology for the
                 information system task at hand is proposed.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Schaschinger:1992:EES,
  author =       "Harald Schaschinger",
  title =        "{ESA --- an} expert supported {OOA} method and tool",
  journal =      j-SIGSOFT,
  volume =       "17",
  number =       "2",
  pages =        "50--56",
  month =        apr,
  year =         "1992",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/130840.130845",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:42 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Although this paper deals with object-oriented
                 software development in general, the focus is
                 definitely set on object-oriented analysis (OOA). After
                 a short comparison of the most important OOA
                 approaches, a new one will be derived. This approach is
                 evolutionary, non-domain specific and starts at the
                 definition of a software system. Based on this approach
                 there will be a presentation of an expert supported OOA
                 tool (ESA), which supports an analyst starting at the
                 collection of the requirements through the analysis of
                 an object-oriented system up to a preliminary
                 high-level design. Both the method and the tool are
                 conceived for the needs of practitioners.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Saradhi:1992:SMD,
  author =       "Motamarri Saradhi",
  title =        "Systems modelling and description",
  journal =      j-SIGSOFT,
  volume =       "17",
  number =       "2",
  pages =        "57--63",
  month =        apr,
  year =         "1992",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/130840.130846",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:42 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The purpose of this paper is to enunciate the
                 underlying notions of systems modelling. There is an
                 obvious lack with many techniques to allow the
                 description of the real world as native to its
                 functioning as possible. A generic analytical framework
                 is likely to have a strong impact in problem solving,
                 whatever may be the domain. Further, it may ease the
                 process of communication among various people by virtue
                 of proper capturing of the system functionality in a
                 more understandable framework. The exploration for such
                 a framework will also rationalize the development
                 process of computerized systems, whether they are going
                 to employ conventional software or AI/ES techniques.
                 The criticality of the computerized systems has been
                 raising potential problems with respect to safety and
                 security. Validation and verification of the systems
                 have become a potential challenge. The current
                 discussion will shed light on these issues, and guide
                 in ensuring a robust application system.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Cherry:1992:GFS,
  author =       "George W. Cherry",
  title =        "Graphic formalisms should integrate communication,
                 control, and data flow",
  journal =      j-SIGSOFT,
  volume =       "17",
  number =       "2",
  pages =        "64--69",
  month =        apr,
  year =         "1992",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/130840.130847",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:42 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{McLaughlin:1992:SNS,
  author =       "Robert McLaughlin",
  title =        "Some notes on software design: reply to a reaction",
  journal =      j-SIGSOFT,
  volume =       "17",
  number =       "2",
  pages =        "70",
  month =        apr,
  year =         "1992",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/130840.130848",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:42 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  note =         "See \cite{vanReeken:1992:SNP}.",
  abstract =     "Mr. van Reeken wrote a note on my note. It is nice to
                 know that some reads what you write. I think his
                 comments force me to be a little more specific. I agree
                 with some of what he says, but must mark my
                 disagreement with other things he says.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Ben-Natan:1992:MAT,
  author =       "Ron Ben-Natan",
  title =        "Making all types typedefed",
  journal =      j-SIGSOFT,
  volume =       "17",
  number =       "2",
  pages =        "72--73",
  month =        apr,
  year =         "1992",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/130840.130849",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:42 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Encapsulation has been recognized as one of the most
                 important methods for assuring that software systems
                 maintenance is made possible. Many modern programming
                 languages now provide specific constructs for
                 encapsulation and abstraction. This note emphasizes the
                 fact that the return types of an encapsulation's
                 interface is a part of the interface functions
                 themselves, and as such must also be encapsulated. The
                 examples are given in C++ and encapsulating of the
                 types is done using typedefs.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Linos:1992:TRC,
  author =       "Panagiotis Linos",
  title =        "{ToolCASE}: a repository of computer-aided software
                 engineering tools",
  journal =      j-SIGSOFT,
  volume =       "17",
  number =       "2",
  pages =        "74--78",
  month =        apr,
  year =         "1992",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/130840.130850",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:42 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The design and construction of an up-to-date
                 repository of CASE (Computer-Aided Software
                 Engineering) tools, called ToolCASE, is introduced in
                 this paper. ToolCASE is populated with information
                 regarding purchasing, citations and software
                 engineering capabilities of existing CASE tools.
                 Purchasing information, included in ToolCASE, embodies
                 vendors, costs, discounts, hardware and software
                 requirements; the citations encompass various
                 publications on CASE, whereas software engineering
                 capabilities comprise phases of the paradigm automated,
                 software application area targeted and methodologies
                 supported by CASE tools. ToolCASE is designed for
                 people with diverse backgrounds who wish to choose the
                 proper CASE tool for their specific needs. For
                 instance, a project manager can retrieve the name and
                 phone number of the company that develops a particular
                 CASE tool, its price and the first year it was
                 available. A software engineer may request all CASE
                 tools that automate a particular phase of a software
                 engineering paradigm, aim at the development of
                 software for a specific application area or follow a
                 certain methodology. In addition, a researcher could
                 acquire citations on existing CASE tools that meet
                 specific requirements.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Hagemeister:1992:ABS,
  author =       "J. Hagemeister and B. Lowther and P. Oman and X. Yu
                 and W. Zhu",
  title =        "An annotated bibliography on software maintenance",
  journal =      j-SIGSOFT,
  volume =       "17",
  number =       "2",
  pages =        "79--84",
  month =        apr,
  year =         "1992",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/130840.130852",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:42 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Saradhi:1992:SEP,
  author =       "Motamarri Saradhi",
  title =        "Software engineering from a practical perspective",
  journal =      j-SIGSOFT,
  volume =       "17",
  number =       "3",
  pages =        "21--26",
  month =        jul,
  year =         "1992",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/140938.140939",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:42 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The development of software is a marathon feat.
                 Software Quality Assurance is a much more difficult and
                 challenging task. Further, putting the software for
                 live use, is a still more complex affair. These matters
                 are not trivial for successful and appropriate
                 exploitation of computers and Information Technology,
                 rather they are the central issues one must answer
                 first. Motivated by the ongoing discussions on a plenty
                 of issues related to software, (software technology!)
                 including standards and quality assurance, I am
                 translating my experiences as the mentioned issues are
                 duly represented in my systems development projects.
                 Perhaps, this is an attempt to bring to light the
                 prominent but less addressed points, especially that
                 are lying at the interface of the several disciplines
                 related to software creation. I present a generic
                 structure of Systems Development Process (SDP) from a
                 practical view point. The presentation will outline the
                 framework of SDP, and the environment in which it takes
                 place to illustrate the line of thinking that has
                 influenced the creation of successful application
                 systems developed in several domains.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Tracz:1992:DAW,
  author =       "Will Tracz",
  title =        "Domain analysis working group report: {First
                 International Workshop on Software Reusability}",
  journal =      j-SIGSOFT,
  volume =       "17",
  number =       "3",
  pages =        "27--34",
  month =        jul,
  year =         "1992",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/140938.140940",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:42 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Loka:1992:SEQ,
  author =       "Raghavendra Rao Loka",
  title =        "Software engineering: quality assurance",
  journal =      j-SIGSOFT,
  volume =       "17",
  number =       "3",
  pages =        "34--38",
  month =        jul,
  year =         "1992",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/140938.140941",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:42 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Ward:1992:NGC,
  author =       "Aidan Ward",
  title =        "The next generation of computer assistance for
                 software engineering",
  journal =      j-SIGSOFT,
  volume =       "17",
  number =       "3",
  pages =        "39--42",
  month =        jul,
  year =         "1992",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/140938.140942",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:42 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Rozman:1992:USE,
  author =       "I. Rozman and J. Gy{\"o}rk{\"o}s and K. Rizma{\~n}",
  title =        "Understandability of the software engineering method
                 as an important factor for selecting a case tool",
  journal =      j-SIGSOFT,
  volume =       "17",
  number =       "3",
  pages =        "43--46",
  month =        jul,
  year =         "1992",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/140938.140943",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:42 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The article highlights the understandability of a
                 software engineering methodology as an important
                 criterion for selecting a CASE tool. This aspect is
                 treated through the comparison of learning properties
                 for two very well known methodology on which the CASE
                 tools are usually based on. The first one is SA-SD and
                 the second one is JSD. In the purpose to compare both
                 methodology a group of young engineers has been tested.
                 Each of them wrote a seminar theme, answered a
                 questionnaire and explained his observations. At the
                 end of the paper, a general conclusion is presented.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Brown:1992:ABI,
  author =       "Alan W. Brown and Maria H. Penedo",
  title =        "An annotated bibliography on integration in software
                 engineering environments",
  journal =      j-SIGSOFT,
  volume =       "17",
  number =       "3",
  pages =        "47--55",
  month =        jul,
  year =         "1992",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/140938.140944",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:42 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Mody:1992:PA,
  author =       "R. P. Mody",
  title =        "Is programming an art?",
  journal =      j-SIGSOFT,
  volume =       "17",
  number =       "4",
  pages =        "19--21",
  month =        oct,
  year =         "1992",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/141874.141877",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:43 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Finkelsteiin:1992:SPI,
  author =       "Anthony Finkelsteiin",
  title =        "A software process immaturity model",
  journal =      j-SIGSOFT,
  volume =       "17",
  number =       "4",
  pages =        "22--23",
  month =        oct,
  year =         "1992",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/141874.141878",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:43 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Chelini:1992:DAR,
  author =       "James V. Chelini",
  title =        "A discussion on the {Ada Run-Time Environment} in
                 safety critical applications",
  journal =      j-SIGSOFT,
  volume =       "17",
  number =       "4",
  pages =        "24--27",
  month =        oct,
  year =         "1992",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/141874.141879",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:43 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/adabooks.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The complex systems being built today are increasingly
                 software driven. These systems, such as air traffic
                 control systems, nuclear power plants, avionics
                 software, and even automotive control software, are
                 integral parts of our world. We take these systems for
                 granted everyday and trust them to work safely, without
                 injury to us. The Ada language is being used in a
                 growing number of these systems. This requires a
                 reevaluation of how the language can be effectively
                 used in safety-critical systems. A key element of this
                 evaluation is the Ada Run-Time Environment (RTE)
                 itself. Ada is unique in that it provides its own
                 real-time executive. This paper examines the impact of
                 the Ada RTE on safety critical software and discusses
                 steps to identify and reduce potential risks.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Walters:1992:UHS,
  author =       "Neal Walters",
  title =        "Using Harel statecharts to model object-oriented
                 behavior",
  journal =      j-SIGSOFT,
  volume =       "17",
  number =       "4",
  pages =        "28--31",
  month =        oct,
  year =         "1992",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/141874.141880",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:43 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Object-oriented analysis and design methods are
                 increasingly being considered for complex system
                 development. However, object-oriented implementations
                 can introduce run-time inefficiencies. Therefore,
                 predicting system behavior is an important simulation
                 objective for validating completeness and analyzing
                 performance. There are two contributors to system
                 behavior --- the individual behavior of each object and
                 the collaborative behavior of object when executing
                 scenarios required by the system. Modeling the
                 collaborative interaction of objects is the primary
                 subject of this paper. Templates for three types of
                 objects are presented: Director, Agent and Server
                 object classes. The mechanisms presented in this paper
                 utilize Harel state diagram notation as supported by
                 the Statemate CASE tool.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Laitinen:1992:DCS,
  author =       "Kari Laitinen",
  title =        "Document classification for software quality systems",
  journal =      j-SIGSOFT,
  volume =       "17",
  number =       "4",
  pages =        "32--39",
  month =        oct,
  year =         "1992",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/141874.141882",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:43 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Software development organizations need to have
                 appropriate document control policies. A software
                 document classification can serve as a framework for
                 establishing such policies. This paper presents a
                 software document classification and discusses the
                 quality system functions needed for each class of
                 documents. Software development is viewed as a
                 documentation process, and documents are considered the
                 most essential products of the development process.
                 Referring to the document classification, new
                 definitions for the concept of software are given, and
                 the general difficulties of software documentation are
                 analyzed.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Perry:1992:FSS,
  author =       "Dewayne E. Perry and Alexander L. Wolf",
  title =        "Foundations for the study of software architecture",
  journal =      j-SIGSOFT,
  volume =       "17",
  number =       "4",
  pages =        "40--52",
  month =        oct,
  year =         "1992",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/141874.141884",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:43 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The purpose of this paper is to build the foundation
                 for software architecture. We first develop an
                 intuition for software architecture by appealing to
                 several well-established architectural disciplines. On
                 the basis of this intuition, we present a model of
                 software architecture that consists of three
                 components: elements, form, and rationale. Elements are
                 either processing, data, or connecting elements. Form
                 is defined in terms of the properties of, and the
                 relationships among, the elements --- that is, the
                 constraints on the elements. The rationale provides the
                 underlying basis for the architecture in terms of the
                 system constraints, which most often derive from the
                 system requirements. We discuss the components of the
                 model in the context of both architectures and
                 architectural styles and present an extended example to
                 illustrate some important architecture and style
                 considerations. We conclude by presenting some of the
                 benefits of our approach to software architecture,
                 summarizing our contributions, and relating our
                 approach to other current work.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Cheng:1992:PSS,
  author =       "Jingwen Cheng",
  title =        "Parameterized specifications for software reuse",
  journal =      j-SIGSOFT,
  volume =       "17",
  number =       "4",
  pages =        "53--59",
  month =        oct,
  year =         "1992",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/141874.141886",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:43 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Software reusability is believed to be the key to
                 improving software development productivity, while
                 specification plays an important part in software
                 reuse. From a modern object oriented view, the reusable
                 software components can be grouped into three
                 categories. Procedural components, abstract data types
                 and concrete data objects. Both procedural components
                 and abstract data types can be parameterized in many
                 Object-Oriented languages. Specifications for reuse of
                 these components are discussed in detail in this paper.
                 The reusable software components and their
                 specifications will form a reusable software library,
                 and the information extracted from the specifications
                 forms a knowledge base. Based on the knowledge base and
                 the reusable software library, a new software
                 development paradigm with software reusability can be
                 realized.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Debest:1992:RCE,
  author =       "Xavier A. Debest and R{\"u}diger Knoop and J{\"u}rgen
                 Wagner",
  title =        "{Reveng}: a cost-effective approach to
                 reverse-engineering",
  journal =      j-SIGSOFT,
  volume =       "17",
  number =       "4",
  pages =        "60--67",
  month =        oct,
  year =         "1992",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/141874.141887",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:43 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Like many other Software Engineering buzzwords,
                 ``Reverse Engineering'' emerges as an attempt to
                 formalize some specific tasks, which have long been
                 performed by almost every software development or
                 maintenance team, but which were not judged worth
                 before to be considered an engineering discipline. The
                 emergence of powerful Computer Aided Software
                 Engineering (CASE) tools opens new opportunities for
                 the cost-effective re-use of the investments made in
                 existing software systems, and thus for the development
                 of specific tools and techniques to recover the
                 original design of these systems. While most of the
                 current discussion is centered around the development
                 and utilization of tools to automate the Reverse
                 Engineering Process, our attention focuses on the
                 practical application of these tools and techniques
                 under conditions found in real world entreprises. From
                 this view-point, the scope of the Reverse Engineering
                 Techniques appears to be much broader than implied by
                 the characteristics of individual tools. Our approach
                 is based on experiences gained by CMG in projects,
                 either directly related to Reverse Engineering or
                 dealing with tasks, where specific Reverse Engineering
                 Techniques and Tools were advantageously used (e.g.
                 Software Maintenance, Re-Design, Down-Sizing,
                 Conversion). It also evidentiates some pitfalls, which
                 may lead to the failure of some Reverse Engineering
                 projects.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Saradhi:1992:DVI,
  author =       "Motamarri Saradhi",
  title =        "A diagnostic view on information technology",
  journal =      j-SIGSOFT,
  volume =       "17",
  number =       "4",
  pages =        "68--70",
  month =        oct,
  year =         "1992",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/141874.141888",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:43 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Computers, computerization, Systems Analysis, Systems
                 Design etc., have become the catchwords of the day. In
                 majority of the cases analysis is interpreted in the
                 narrow sense as the study of the existing system in
                 view of computerizing its operations. The thrust for
                 computerization is emphasized without any relevance to
                 the context of application. The real power of the
                 computer, its limitations, and level of applicability
                 are not properly thought of. Computerization at most,
                 is one facet of Information Technology; is surprisingly
                 overlooked. The aim of this article is to drive home
                 the point that a much rational thought and approach are
                 mandatory to get fruitful benefits out of Information
                 Technology.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Ferrans:1992:HFH,
  author =       "James C. Ferrans and David W. Hurst and Michael A.
                 Sennett and Burton M. Covnot and Wenguang Ji and Peter
                 Kajka and Wei Ouyang",
  title =        "{HyperWeb}: a framework for hypermedia-based
                 environments",
  journal =      j-SIGSOFT,
  volume =       "17",
  number =       "5",
  pages =        "1--10",
  month =        dec,
  year =         "1992",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/142882.142899",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:44 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Software productivity and quality will increase as we
                 improve our model of software and develop tools to
                 support that model. Development environments must take
                 into account that software is more than source; that it
                 is more than text; and that it forms a highly
                 interconnected web of information. Because more time is
                 spent understanding and maintaining software than
                 creating it, environments should strongly support
                 browsing and reading. Finally, environments must be
                 easy to customize. In this paper we present HyperWeb, a
                 framework that supports the construction of
                 hypermedia-based software development environments
                 having this richer view of software. It coordinates the
                 activities of an integrated set of tools through a
                 message server, uses an object-oriented database to
                 store software artifacts, and supports hypermedia
                 linking of these software artifacts. It is built around
                 an interpreter for a general purpose scripting
                 language, allowing for very flexible customization and
                 environment building. We also describe our experience
                 in using it to build an environment that supports
                 software design, development and maintenance on Unix.
                 Its primary features include support for document
                 linking, source code annotation and restructuring, and
                 modification request tracking. It is being used and
                 evaluated internally and at several external sites.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Kaplan:1992:SCS,
  author =       "Simon M. Kaplan and William J. Tolone and Alan M.
                 Carroll and Douglas P. Bogia and Celsina Bignoli",
  title =        "Supporting collaborative software development with
                 {ConversationBuilder}",
  journal =      j-SIGSOFT,
  volume =       "17",
  number =       "5",
  pages =        "11--20",
  month =        dec,
  year =         "1992",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/142882.142903",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:44 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "In this paper we discuss the architecture of the
                 Conversation Builder, an environment for collaborative
                 work, and show how our framework provides a powerful
                 basis for support of collaborative software development
                 activities.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Barghouti:1992:SCM,
  author =       "Naser S. Barghouti",
  title =        "Supporting cooperation in the {Marvel}
                 process-centered {SDE}",
  journal =      j-SIGSOFT,
  volume =       "17",
  number =       "5",
  pages =        "21--31",
  month =        dec,
  year =         "1992",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/142882.142907",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:44 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Large scale software development processes often
                 require cooperation among multiple teams of developers.
                 To support such processes, SDEs must allow developers
                 to interleave their access to the various components of
                 the projects. This interleaving can lead to
                 interference, which may corrupt the project components.
                 In traditional database systems, the problem is avoided
                 by enforcing serializability among concurrent
                 transactions. In traditional software development, the
                 problem has been addressed by introducing version and
                 configuration management techniques combined with
                 checkout/checkin mechanisms. Unfortunately, both of
                 these solutions are too restrictive for SDEs because
                 they enforce serialization of access to data, making
                 cooperation unacceptably difficult. In this paper, I
                 illustrate the problem and show how the encoding of the
                 software development process in process-centered SDEs
                 can be used to provide more appropriate concurrency
                 control. I present the concurrency control mechanism I
                 developed for the MARVEL SDE. This mechanism uses the
                 process model in MARVEL to support the degree of
                 cooperation specified in the development process.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Quester:1992:OCF,
  author =       "Remco Quester",
  title =        "{obTIOS}: a {CAx-framework} service for building
                 concurrent engineering environments",
  journal =      j-SIGSOFT,
  volume =       "17",
  number =       "5",
  pages =        "32--40",
  month =        dec,
  year =         "1992",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/142882.142909",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:44 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "An open integrated CAx-framework supplies services to
                 build derived CAx-environments (e.g. for concurrent
                 Engineering (CE), VLSI-design, Software Engineering,
                 etc.) with specialized, integrated in-house or foreign
                 tools. Such integrated tool uses services of the
                 CAx-framework and cooperates with other integrated
                 tools to achieve a common engineering objective like
                 the simulation of a VLSI-circuit. In most
                 CAx-frameworks the integrated tools cooperate
                 indirectly using CAx-framework services like Data
                 Handling or Inter-Tool Communication (ITC). With obTIOS
                 a high-level approach to control cooperation of
                 integrated tools within a Computer Aided Concurrent
                 Engineering (CACE) environment is introduced. The tools
                 of a CACE-environment are grouped to domains which
                 represent the most coarse, mutually independent,
                 structural unit within the CACE-environment. The way in
                 which the tools of a domain cooperate is described by
                 Encapsulated Composed Activities (ECA). An ECA
                 represents a template of control regarding
                 cooperation-in-the-large and cooperation-in-the-small
                 of tools.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Toleman:1992:EIM,
  author =       "Mark A. Toleman and Jim Welsh and Alan J. Chapman",
  title =        "An empirical investigation of menu design in
                 language-based editors",
  journal =      j-SIGSOFT,
  volume =       "17",
  number =       "5",
  pages =        "41--46",
  month =        dec,
  year =         "1992",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/142882.142911",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:44 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "In program visualization some form of graphics is used
                 to represent some aspect of a program. However,
                 graphics are necessarily expensive with respect to
                 ``screen real estate''. Alternatives, therefore, may be
                 required for presentation of certain concepts
                 fundamental to the programmer's model of a program. For
                 example, one graphical representation of a program,
                 written in a block-structured language like Pascal or
                 Modula-2, is the structure chart model of the
                 hierarchical structure of the blocks or modules making
                 up the program. This graphic may be the most
                 appropriate but it may not be conveniently implemented
                 as a menu and a means of ``directly'' selecting blocks
                 of program code to view or edit. Such graphics are used
                 extensively, for example, in the Garden environment
                 developed at Brown University. An alternative is a
                 text-based list of block names indented to summarize
                 the program's structure. UQ1, a language-based editor
                 developed at the University of Queensland, implements
                 the concept in this manner. Both types of menu
                 structure were examined and compared for efficiency in
                 a direct manipulation style of interaction. In general,
                 there was no significant difference ($ P > 0.05$) in
                 time taken by subjects to select items from either
                 style of menu.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Meyers:1992:ESM,
  author =       "Scott Meyers and Steven P. Reiss",
  title =        "An empirical study of multiple-view software
                 development",
  journal =      j-SIGSOFT,
  volume =       "17",
  number =       "5",
  pages =        "47--57",
  month =        dec,
  year =         "1992",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/142882.142913",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:44 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Hangensen:1992:CSS,
  author =       "Torben Mejlvang Hangensen and Bent Bruun Kristensen",
  title =        "Consistency in software system development: framework,
                 model, techniques \& tools",
  journal =      j-SIGSOFT,
  volume =       "17",
  number =       "5",
  pages =        "58--67",
  month =        dec,
  year =         "1992",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/142882.142914",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:44 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "An important aspect in the software development
                 process is the consistency between various parts of the
                 software system being designed and implemented. During
                 the development of a system we are aware of the
                 consistency problems and we usually solve these by
                 special arrangements developed as part of the
                 development of the software system. In general the
                 solutions applied for some specific system cannot be
                 reused for other systems. The purpose of this paper is
                 to introduce a general understanding of consistency and
                 the techniques and tools for handling consistency. We
                 introduce a concept called description to denote the
                 various pieces of information which must be consistent.
                 The description covers any fragments software and data,
                 e.g. such as source code, parse trees, and machine
                 code. The interpretation of a description is defined as
                 a mapping into the set of objects, that the description
                 is supposed to describe. Consistency of descriptions is
                 defined as relations between the interpretations of the
                 descriptions. The concepts description, interpretation
                 and relation are used as a framework for modeling
                 consistency in software systems. A consistency model
                 includes interfaces, control parts and representations
                 for descriptions in a system, and a specification of
                 the consistency relations, that are relevant for the
                 system. The model provides consistency as a new and
                 very important perspective on software systems. It
                 provides a graphical notation, which gives an overview
                 of the consistency relations in a software system being
                 designed. The model is very general and it does
                 therefore apply to any type of software systems. This
                 restricts the level of detail in the model of
                 consistency, but the model allows enhancement of the
                 specification once the type of software system is
                 given. We define four basic techniques for handling
                 consistency in software systems modeled in terms of
                 descriptions. By combining these techniques we are able
                 to describe the handling of consistency in a given
                 software system. These techniques and the graphical
                 consistency modeling language form a first step towards
                 an engineered approach to the construction of software
                 systems from a consistency view.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Garlan:1992:TAG,
  author =       "David Garlan and Linxi Cai and Robert L. Nord",
  title =        "A transformational approach to generating
                 application-specific environments",
  journal =      j-SIGSOFT,
  volume =       "17",
  number =       "5",
  pages =        "68--77",
  month =        dec,
  year =         "1992",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/142882.142917",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:44 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Current software development environments tend to lie
                 at opposite ends of a spectrum: at one extreme are
                 specialized application generators; at the other are
                 general-purpose programming environments. The former
                 provide strong support for system development and
                 reuse, but are costly to build and available only for
                 limited domains. The latter provide weak support, but
                 are generally available and universally applicable. We
                 describe a technique for automating the production of
                 application-specific environments that lie between
                 these two extremes. The key idea is that these
                 environments can be derived from general-purpose
                 programming environments by a process of structured
                 transformation. We describe a tool for performing these
                 transformations. It provides a set of formal operators
                 for specializing a description of a general-purpose
                 environment; as operators are applied, the system
                 semi-automatically builds a set of transformation rules
                 used to translate application-specific programs into
                 those of the original general-purpose environment. The
                 output of the tool is an application-specific
                 environment together with a program transformer that
                 provides execution semantics for programs written in
                 that environment.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Lippe:1992:OBM,
  author =       "Ernst Lippe and Norbert van Oosterom",
  title =        "Operation-based merging",
  journal =      j-SIGSOFT,
  volume =       "17",
  number =       "5",
  pages =        "78--87",
  month =        dec,
  year =         "1992",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/142882.143753",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:44 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Existing approaches for merging the results of
                 parallel development activities are limited. These
                 approaches can be characterised as state-based: only
                 the initial and final states are considered. This paper
                 introduces operation-based merging, which uses the
                 operations that were performed during development. In
                 many cases operation-based merging has advantages over
                 state-based merging, because it automatically respects
                 the data-type invariants of the objects, is extensible
                 for arbitrary object types, provides better conflict
                 detection and allows for better support for solving
                 these conflicts. Several algorithms for conflict
                 detection are described and compared.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Muller:1992:REE,
  author =       "H. A. M{\"u}ller and S. R. Tilley and M. A. Orgun and
                 B. D. Corrie and N. H. Madhavji",
  title =        "A reverse engineering environment based on spatial and
                 visual software interconnection models",
  journal =      j-SIGSOFT,
  volume =       "17",
  number =       "5",
  pages =        "88--98",
  month =        dec,
  year =         "1992",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/142882.143755",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:44 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Reverse engineering is the process of extracting
                 system abstractions and design information out of
                 existing software systems. This information can then be
                 used for subsequent development, maintenance,
                 re-engineering, or reuse purposes. This process
                 involves the identification of software artifacts in a
                 particular subject system, and the aggregation of these
                 artifacts to form more abstract system representations.
                 This paper describes a reverse engineering environment
                 which uses the spatial and visual information inherent
                 in graphical representations of software systems to
                 form the basis of a software interconnection model.
                 This information is displayed and manipulated by the
                 reverse engineer using an interactive graph editor to
                 build subsystem structures out of software building
                 blocks. The spatial component constitutes information
                 about how a software structure looks. The coexistence
                 of these two representations is critical to the
                 comprehensive appreciation of the generated data, and
                 greatly benefits subsequent analysis, processing, and
                 decision-making.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{White:1992:IHC,
  author =       "Elizabeth L. White and James M. Purtilo",
  title =        "Integrating the heterogeneous control properties of
                 software modules",
  journal =      j-SIGSOFT,
  volume =       "17",
  number =       "5",
  pages =        "99--108",
  month =        dec,
  year =         "1992",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/142882.143757",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:44 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "A concurrent software application, whether running on
                 a single machine or distributed across multiple
                 machines, is composed of tasks that interact
                 (communicate and sychronize) in order to achieve some
                 goal. Developing such concurrent programs so they
                 cooperate effectively is a complex task, requiring that
                 progrmmers craft their modules--the components from
                 which concurrent applications are built --- to meet
                 both functional requirements and communication
                 requirements. Unfortunately the result of this effort
                 is a module that is difficult to reason about and even
                 more difficult to reuse. Making programmers treat too
                 many diverse issues simultaneously leads to increased
                 development costs and opportunities for error. This
                 suggests the need for ways that a developer may specify
                 control requirements separately from the implementation
                 of functional requirements, but then have this
                 information used automatically when building the
                 component executables. The result is an environment
                 where programmers have increased flexibility in
                 composing software modules into concurrent
                 applications, and in reusing those same modules. This
                 paper describes our research toward a technology for
                 control integration, where we have developed techniques
                 for users to express control objectives for an
                 application and a system that translates those
                 specifications for use in packaging executables.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Richardson:1992:DIP,
  author =       "Debra J. Richardson and T. Owen O'Malley and Cynthia
                 Tittle Moore and Stephanie Leif Aha",
  title =        "Developing and integrating {ProDAG} in the {Arcadia}
                 environment",
  journal =      j-SIGSOFT,
  volume =       "17",
  number =       "5",
  pages =        "109--119",
  month =        dec,
  year =         "1992",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/142882.143759",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:44 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "ProDAG is an analysis toolset that provides an
                 application programmatic interface for program
                 dependence analysis. Program dependences are syntactic
                 relationships between program statements. The ProDAG
                 interface provides a uniform set of operations for
                 creating and accessing several pre-defined dependence
                 relations, which are represented as graphs, as well as
                 a standard mechanism for developing new dependence
                 graphs. ProDAG is one analysis toolset in Arcadia,
                 ProDAG was developed in the Arcadia environment and has
                 been integrated with the language processing, object
                 management, and process definition components of the
                 Arcadia architecture, and further integration with the
                 user interface development system and the measurement
                 and evaluation components are underway. This paper
                 describes the design, implementation and integration of
                 proDAG within Arcadia.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Thery:1992:RTP,
  author =       "Laurent Th{\'e}ry and Yves Bertot and Gilles Kahn",
  title =        "Real theorem provers deserve real user-interfaces",
  journal =      j-SIGSOFT,
  volume =       "17",
  number =       "5",
  pages =        "120--129",
  month =        dec,
  year =         "1992",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/142882.143760",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:44 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This paper explains how to add a modern user interface
                 to existing theorem provers, using principles and tools
                 designed for programming environments.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Graham:1992:PPS,
  author =       "Susan L. Graham and Michael A. Harrison and Ethan V.
                 Munson",
  title =        "The {Proteus} presentation system",
  journal =      j-SIGSOFT,
  volume =       "17",
  number =       "5",
  pages =        "130--138",
  month =        dec,
  year =         "1992",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/142882.143762",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:44 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Software development environments can increase user
                 productivity by presenting information in more useful
                 ways. This paper describes Proteus, the presentation
                 system of Ensemble, a software development environment
                 that supports a wide variety of language and document
                 capabilities. Proteus provides a set of services which
                 allow the appearance of software development documents,
                 such as programs or design specifications, to be
                 determined by formal specifications of style. Proteus
                 is based on a generic model of presentation services
                 and is intended for use with a wide variety of media.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Brown:1992:ATE,
  author =       "Alan W. Brown and Peter H. Feiler",
  title =        "An analysis technique for examining integration in a
                 project support environment",
  journal =      j-SIGSOFT,
  volume =       "17",
  number =       "5",
  pages =        "139--148",
  month =        dec,
  year =         "1992",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/142882.143764",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:44 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "While many Computer-Aided Software Engineering (CASE)
                 tool vendors claim to provide open, integrated
                 environments for software development, in practice such
                 claims must be examined very carefully to understand
                 what is meant. One of the problems faced in trying to
                 examine these claims is that there is no established
                 technique for examining software development
                 environments with regard to their integration
                 characteristics.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Ben-Shaul:1992:AMU,
  author =       "Israel Z. Ben-Shaul and Gail E. Kaiser and George T.
                 Heineman",
  title =        "An architecture for multi-user software development
                 environments",
  journal =      j-SIGSOFT,
  volume =       "17",
  number =       "5",
  pages =        "149--158",
  month =        dec,
  year =         "1992",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/142882.143765",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:44 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "We present an architecture for multi-user software
                 development environments, covering general,
                 process-centered and rule-based MUSDEs. Our
                 architecture is founded on componentization, with
                 particular concern for the capability to replace the
                 synchronization component--to allow experimentation
                 with novel concurrency control mechanisms--with minimal
                 effects on other components while still supporting
                 integration. The architecture has been implemented for
                 the MARVEL SDE.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Heimbigner:1992:PPS,
  author =       "Dennis Heimbigner",
  title =        "The {ProcessWall}: a process state server approach to
                 process programming",
  journal =      j-SIGSOFT,
  volume =       "17",
  number =       "5",
  pages =        "159--168",
  month =        dec,
  year =         "1992",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/142882.143767",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:44 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The ProcessWall is a process state server providing
                 storage for process states plus operations for defining
                 and manipulating the structure of those states. It
                 separates the state of a software process from any
                 program for constructing that state. Instead, client
                 programs implement the processes for operating on the
                 process state. This approach has a number of potential
                 benefits such as support for process formalism
                 interoperability, support for multiple process
                 languages, low-cost retro-fitting of process into
                 existing environments, and support for long-term
                 execution of processes. The process server interface
                 provides descriptive mechanisms for representing
                 process state as well as product state. A
                 classification of client programs is provided to show
                 how the state server can be used in a variety of
                 ways.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Kadia:1992:IEB,
  author =       "R. Kadia",
  title =        "Issues encountered in building a flexible software
                 development environment: lessons from the {Arcadia}
                 project",
  journal =      j-SIGSOFT,
  volume =       "17",
  number =       "5",
  pages =        "169--180",
  month =        dec,
  year =         "1992",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/142882.143768",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:44 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This paper presents some of the more significant
                 technical lessons that the Arcadia project has learned
                 about developing effective software development
                 environments. The principal components of the Arcadia-1
                 architecture are capabilities for process definition
                 and execution, object management, user interface
                 development and management, measurement and evaluation,
                 language processing, and analysis and testing. In
                 simultaneously and cooperatively developing solutions
                 in these areas we learned several key lessons. Among
                 them: the need to combine and apply heterogeneous
                 componentry, multiple techniques for developing
                 components, the pervasive need for rich type models,
                 the need for supporting dynamism (and at what
                 granularity), the role and value of concurrency, and
                 the role and various forms of event-based control
                 integration mechanisms. These lessons are explored in
                 the paper.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Loy:1993:MWS,
  author =       "Patrick Loy",
  title =        "The method won't save you: (but it can help)",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "1",
  pages =        "30--34",
  month =        jan,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/157397.157398",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:45 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Tichy:1993:SDW,
  author =       "Walter F. Tichy and Nico Habermann and Lutz Prechelt",
  title =        "Summary of the {Dagstuhl Workshop on Future Directions
                 in Software Engineering: February 17--21, 1992,
                 Schlo{\ss} Dagstuhl}",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "1",
  pages =        "35--48",
  month =        jan,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/157397.157399",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:45 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The intent of the workshop was to bring together
                 leading scientists for identifying promising directions
                 for future research in Software Engineering. The
                 motivation for the workshop was the realization that
                 Software Engineering research was not in good shape,
                 with the present emphasis on management and risk
                 control diverting attention from hard, technical
                 subjects. After week-long, intensive discussions of a
                 great number of issues, the following topics were seen
                 as most crucial for progress:1. Developing the area of
                 software architecture as a foundation of Software
                 Engineering;2. Learning to master evolving systems;3.
                 Building a scientific basis for Software Engineering;4.
                 Emphasizing science and engineering know-how when
                 educating practitioners. Formal methods, domain
                 specific knowledge, special purpose languages, and
                 reuse were seen as important approaches, but not as
                 solutions or ends in themselves. There was also a fair
                 amount of introspection on proper method, evaluation,
                 and experimentation in Software Engineering research.
                 This report contains participants' position statements
                 and a record of the discussions. The editors hope that
                 it may help make research in Software Engineering an
                 exciting and thriving endeavor once again.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Terashima:1993:TAC,
  author =       "Nobuyoshi Terashima",
  title =        "Toward automated communication software development",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "1",
  pages =        "49--51",
  month =        jan,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/157397.157401",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:45 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Aggarwal:1993:TWO,
  author =       "E. K. Aggarwal and M. Pavan Kumar and Vinay Santurkar
                 and Radha Ratnaparkhi",
  title =        "Towards a weighted operational profile",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "1",
  pages =        "52--53",
  month =        jan,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/157397.157402",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:45 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Lang:1993:SMO,
  author =       "Neil Lang",
  title =        "{Schlaer--Mellor} object-oriented analysis rules",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "1",
  pages =        "54--58",
  month =        jan,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/157397.157404",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:45 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Shlaer-Mellor Object Oriented Analysis provides a
                 complete and executable description of a problem domain
                 using a set of formal analysis models: an information
                 model, a set of state models, and a set of process
                 models. In this paper we present the conditions that
                 must be satisfied by a valid Shlaer-Mellor Object
                 Oriented Analysis.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Saradhi:1993:DCP,
  author =       "Motamarri Saradhi",
  title =        "Database conversion planning",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "1",
  pages =        "59--64",
  month =        jan,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/157397.157405",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:45 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "In conventional approaches to Systems Development the
                 crucial task of the exercise, deployment figures
                 almost, at the end! The performance of the developed
                 software can only be realized if and only if, there is
                 a database to interact with. Surprisingly, this slips
                 the attention of system developers! The challenge of
                 converting the existing manual system, of all, the
                 database maintained in paper volumes to that of
                 computerized version, is not well accounted for.
                 However, mundane this task, Database Conversion
                 Planning (DBCP), has a definite and dominant role to
                 play in systems development. While handling several
                 complex turnkey computerization projects, we are
                 compelled to realize the criticality of DBCP. A careful
                 consideration of these issues in the early stages of
                 systems development has shown a multitude of benefits.
                 As a result, we were able to deploy projects amidst
                 several constraining and conflicting factors. The
                 projects have won the appreciation of customers, of
                 all, end-users. We would like to share the vision that
                 had lead to the creation of these systems, where
                 software and quality have only synonymous meaning! We
                 finally wish that these thoughts will influence the
                 practice of systems development or in general, software
                 engineering.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Vazquez:1993:ASF,
  author =       "Federico Vazquez and Guy Hanacek",
  title =        "Automatic system file generator",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "1",
  pages =        "65--73",
  month =        jan,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/157397.157407",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:45 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The Advanced Automation System is a large complex
                 system for Air Traffic Control used by the Federal
                 Aviation Administration and its development is expected
                 to last several years. Data Structure Design will
                 change throughout the development cycle during these
                 years. The Automatic System File Generator (ASFG) is
                 designed to ease the effect of this continuous change
                 in design in the area of Data Analysis. ASFG allows the
                 creation of system files from thousands of message
                 types whose structure is in continuous modification and
                 revision. The basic purpose of the ASFG is to allow the
                 input of any kind of message type files and convert
                 them to system files for use by the Report System that
                 is implemented with the Statistical Package for the
                 Social Sciences (SPSS).",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Liao:1993:SRB,
  author =       "Hsian-Chou Liao and Feng-Jian Wang",
  title =        "Software reuse based on a large object-oriented
                 library",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "1",
  pages =        "74--80",
  month =        jan,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/157397.157409",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:45 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Object-oriented software libraries expand in size more
                 rapidly than other type of software library. This paper
                 presents a simple approach for aiding reuse in software
                 development using object-oriented library. Our approach
                 improves the effectiveness of code searching by
                 reorganizing the library with facet classification
                 scheme and thesaurus. Information in specification
                 models, such as data flow diagrams (DFDs), is extracted
                 through object abstraction and then used as a query
                 input. We are currently implementing a Computer-Aided
                 Reuse Tool (CART) based on the approach.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Brykczynski:1993:ABS,
  author =       "Bill Brykczynski and David A. Wheeler",
  title =        "An annotated bibliography on software inspections",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "1",
  pages =        "81--88",
  month =        jan,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/157397.157411",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:45 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Neumann:1993:RPC,
  author =       "Peter G. Neumann",
  title =        "Risks to the public in computers and related systems",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "2",
  pages =        "4--17",
  month =        apr,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/159420.155829",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:46 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{McLaughlin:1993:DCM,
  author =       "Robert McLaughlin",
  title =        "Does {CASE} make the customer happier",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "2",
  pages =        "18",
  month =        apr,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/159420.156630",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:46 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "CASE technology is and will change the nature of
                 software development. It is often hailed as the thing
                 that will save our industry. It is however just another
                 tool. Just as a good hammer in the hands of a bad
                 carpenter will make a house that collapses, CASE in the
                 hands of a fool will save no one.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Boundy:1993:SCS,
  author =       "David Boundy",
  title =        "Software cancer: the seven early warning signs",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "2",
  pages =        "19",
  month =        apr,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/159420.156632",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:46 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Olenfeldt:1993:WSC,
  author =       "Lars Olenfeldt",
  title =        "{Wish-4}: a specification for a {CASE}-tool to wish
                 for",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "2",
  pages =        "20--22",
  month =        apr,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/159420.155830",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:46 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Carmel:1993:DSC,
  author =       "Erran Carmel",
  title =        "A discussion of special characteristics for software
                 package development life cycle models",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "2",
  pages =        "23--24",
  month =        apr,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/159420.155832",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:46 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Software package development (SPD) is playing an
                 increasingly important role in the software market.
                 Traditionally, most software has been developed for
                 custom purposes which differs somewhat from SPD in some
                 Life Cycle Model (LCM) characteristics. Five special
                 characteristics for SPD are discussed: accommodating
                 the unknown user, formalizing customer requirements,
                 supporting multiple platforms and versions,
                 facilitating speed of development and reacting to
                 market pressures, and incorporating risk
                 minimization.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Kokol:1993:MHW,
  author =       "Peter Kokol",
  title =        "Metamodeling: how, why and what?",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "2",
  pages =        "25--26",
  month =        apr,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/159420.155834",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:46 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The metamodeling is analyzed in the context of three
                 crucial questions: How, why and What? This analysis
                 showed that albeit the great advancement of process
                 modeling in last years at least one important question
                 still remains unsolved: How to design new process
                 models? In this paper we introduce a metaparadigm as a
                 possible solution to this question. Metaparadigm is a
                 metadesign paradigm based on Checklands Soft System
                 Methodology.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Fisch:1993:UIU,
  author =       "Eric A. Fisch",
  title =        "Understanding and improving the user interface design
                 process",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "2",
  pages =        "27--29",
  month =        apr,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/159420.155835",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:46 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Over the past few years user interfaces, especially
                 graphical ones, have been emphasized in the design of
                 computer systems [1]. Users often take for granted the
                 interfaces of today's computer systems. The person
                 entering data or typing up a report does not even
                 consider the work that has gone into making the system
                 and its applications as easy to use as a pen and paper.
                 The difficulty that does go into creating the
                 ``perfect'' user interface begins from the systems
                 inception and does not end until the system becomes
                 obsolete. Even then, the lasting effects of the
                 interface on its users will make future designers work
                 more laborious. This paper will discuss the design
                 process of the user interface. It concludes with some
                 suggestions that future designers may wish to consider
                 to make their jobs easier.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Kaindl:1993:MLR,
  author =       "Hermann Kaindl",
  title =        "The missing link in requirements engineering",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "2",
  pages =        "30--39",
  month =        apr,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/159420.155836",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:46 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Especially the early phase of requirements engineering
                 is one of the most important and least supported parts
                 of the software life cycle. Since pure natural language
                 has its disadvantages, and directly arriving at a
                 formal representation is very difficult, a link through
                 a mediating representation is missing. We use hypertext
                 for this purpose, providing also links among
                 requirements statements and the representation of
                 objects in a domain model. This possibility of explicit
                 representation of links allows the users and analysts
                 to make relationships and dependencies explicit and
                 helps to be aware of them. Actually, our approach and
                 the tool supporting it use a combination of various
                 technologies, including also object-oriented approaches
                 and a grain of artificial intelligence (in particular
                 frames). Therefore, inheritance is provided by our tool
                 already in the early phase of requirements engineering.
                 In particular, we found it very useful to view
                 requirements as objects. A key idea is to support the
                 ordering of ideas especially through classification
                 already in the early stages. While our approach is not
                 intended to substitute useful existing techniques
                 emphasizing more formal representations, it can be
                 combined with them.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Tracz:1993:DSS,
  author =       "Will Tracz and Lou Coglianese and Patrick Young",
  title =        "A domain-specific software architecture engineering
                 process outline",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "2",
  pages =        "40--49",
  month =        apr,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/159420.155837",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:46 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "One of the dilemmas that has prevented software
                 developers from reusing software is the lack of
                 software artifacts to use or the existence of artifacts
                 that are difficult to integrate. Domain-Specific
                 Software Architectures (DSSAs) have been proposed[4] in
                 order to address these issues. A DSAA not only provides
                 a framework for reusable software components to fit
                 into, but captures the design rationale and provides
                 for a degree of adaptability. This paper$_1$ presents
                 an outline for a Domain-Specifid Software Architecture
                 engineering process.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Terwilliger:1993:TTS,
  author =       "Robert B. Terwilliger",
  title =        "Toward tools to support the {Gries\slash Dijkstra}
                 design process",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "2",
  pages =        "50--59",
  month =        apr,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/159420.155838",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:46 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/bibnet/authors/d/dijkstra-edsger-w.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "We are investigating software design processes using a
                 three part approach. For a design method of interest,
                 we first perform walkthroughs on a number of small
                 problems. Second, we construct a simulation program
                 which duplicates the designs produced by the
                 walkthroughs, and third, we construct a process program
                 that supports human application of the method. We have
                 been pursuing this program for the formal design
                 process developed by Dijkstra and Gries. In this paper,
                 we describe our first step towards process programming
                 this method: ISLET, a language-oriented program/proof
                 editor. ISLET supports simple stepwise refinement with
                 proof by automatically generating and mechanically
                 certifying verification conditions. In addition,
                 through ISLET the programmer has access to a library of
                 pre-verified cliches that can be used to create
                 programs more easily. We have constructed a prototype
                 implementation in Prolog and used it to generate a
                 number of example designs.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Sharble:1993:OOB,
  author =       "Robert C. Sharble and Samuel S. Cohen",
  title =        "The object-oriented brewery: a comparison of two
                 object-oriented development methods",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "2",
  pages =        "60--73",
  month =        apr,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/159420.155839",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:46 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Interest in object-oriented methods has been rapidly
                 increasing, as software developers and project managers
                 try to reduce escalating development and maintenance
                 costs. There is an increasing need to determine if
                 there are differences in effectiveness between various
                 methods of object-oriented software development, and
                 whether techniques from more successful methods can be
                 extracted and applied to improve other methods. This
                 paper reports on research to compare the effectiveness
                 of two methods for the development of object-oriented
                 software. These methods are representative of two
                 dominant approaches in the industry. The methods are
                 the responsibility-driven method and a data-driven
                 method that was developed at The Boeing Company and
                 taught in a course available to the public. Each of the
                 methods was used to develop a model of the same example
                 system. A suite of metrics suitable for object-oriented
                 software was used to collect data for each model, and
                 the data was analyzed to identify differences. The
                 model developed with the responsibility-driven method
                 was found to be much less complex, and specifically to
                 have much less coupling between objects and much more
                 cohesion within an object.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Griss:1993:WFA,
  author =       "Martin Griss and Will Tracz",
  title =        "{WISR'92: Fifth Annual Workshop in Software Reuse}:
                 working group reports",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "2",
  pages =        "74--85",
  month =        apr,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/159420.155841",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:46 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Cherry:1993:SRM,
  author =       "George W. Cherry",
  title =        "Stimulus-response machines: a new visual formalism for
                 describing classes and objects",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "2",
  pages =        "86--95",
  month =        apr,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/159420.155842",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:46 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Arifoglu:1993:MSC,
  author =       "Ali Arifoglu",
  title =        "A methodology for software cost estimation",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "2",
  pages =        "96--105",
  month =        apr,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/159420.155844",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:46 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Software Cost Estimation is an empirical process to be
                 applied to find out basically the effort and
                 development time requirements for the software product
                 which is going to be developed. The process starts with
                 the planning phase activities and refined throughout
                 the development. It is very important for managing and
                 scheduling the software project. Various cost
                 estimation methods are available to be used for
                 software development process. Depending on the size of
                 the software, a macro (for the information systems
                 requiring more than 30 man years to develop) or a micro
                 cost model can be used for estimation. The paper
                 discusses available work on the cost estimation methods
                 and proposes a methodological view in cost estimation.
                 Basically, the methodology involves; how to combine
                 available cost estimation techniques to have better
                 estimation and, how to apply the methodology through
                 software development. In the application of the cost
                 estimation techniques, SD (Structured
                 Development/Design) methodology is assumed as applied
                 during the development. Some of the observations in the
                 experiments are also given in the paper.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Shu:1993:IRC,
  author =       "William S. Shu",
  title =        "Inertia --- the reluctance of code motion?",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "2",
  pages =        "106--108",
  month =        apr,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/159420.155845",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:46 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The effects of optimisation on debugging were
                 characterised, first as metric-based distances along
                 paths, and then within an algebraic framework [6, 7,
                 8]. In them, we observed algorithmic ambiguities which
                 may seriously compromise the efficiency-though not the
                 semantic definition-of a debugger for optimised
                 programs. Informal observations appear to indicate
                 enhanced performance if displaced codes were favoured
                 for further displacements, and unmoved codes were
                 preferentially left alone. This reluctance to change
                 the ``state of code motion'' seems much like the
                 physical quantity known as inertia. This paper
                 highlights points to support the ``inertial argument'',
                 and raises questions to be explored in relation to
                 it.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Tripp:1993:SDP,
  author =       "Leonard L. Tripp",
  title =        "Standards development preference survey",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "2",
  pages =        "109",
  month =        apr,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/159420.155846",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:46 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Blum:1993:DPC,
  author =       "Manuel Blum",
  title =        "Designing programs to check their work (abstract)",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "3",
  pages =        "1",
  month =        jul,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/174146.154185",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:48 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Students, engineers, programmers, \ldots{}, are all
                 expected to check their work. Computer programs are
                 not. There are several reasons for this: 1. Computer
                 hardware almost never makes errors --- but that fails
                 to recognize that programmers do! 2. Programs are hard
                 enough to write without having to also write program
                 checkers for them --- but that is the price of
                 increased confidence! 3. There is no clear notion what
                 constitutes a good checker. Indeed, the same students
                 and engineers who are cautioned to check their work are
                 rarely informed what it is that makes a procedure good
                 for doing so --- but that is just the sort of problem
                 that computer science should be able to solve! In my
                 view, the lack of correctness checks in programs is an
                 oversight. Programs have bugs that could perfectly well
                 be caught by such checks. This talk urges that programs
                 be written to check their work, and outlines a
                 promising and rigorous approach to the study of this
                 fascinating new area.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Woit:1993:SOP,
  author =       "Denise M. Woit",
  title =        "Specifying operational profiles for modules",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "3",
  pages =        "2--10",
  month =        jul,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/174146.154187",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:48 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "We describe a technique for specifying operational
                 profiles for modules. The technique is more general
                 than those of the current literature and allows more
                 accurate specification of module usage. We also outline
                 an algorithm for automatically generating random test
                 cases from any such operational profile specification
                 for a module, such that the test cases correspond to a
                 random sampling of the module's input in actual
                 operation. Operational-based statistical estimations,
                 such as operational reliability, may be more meaningful
                 when our specification method and generation algorithm
                 are used, because our method permits more precise
                 specifications than do other methods in the current
                 literature.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Stocks:1993:TTF,
  author =       "P. Stocks and D. Carrington",
  title =        "Test template framework: a specification-based testing
                 case study",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "3",
  pages =        "11--18",
  month =        jul,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/174146.154190",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:48 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "A framework for specification-based testing is
                 demonstrated on a symbol table case study, specified
                 using the Z notation. Test derivation and structuring
                 is discussed, as well as applications of the framework
                 in deriving test oracles and aiding regressing testing
                 during maintenance. Areas for further research and
                 discussion are comparison of heuristics with regard to
                 generated test suites and usability, formalising
                 testing heuristics, and the discrepancy between
                 functional testing and robustness testing.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Jackson:1993:AAA,
  author =       "Daniel Jackson",
  title =        "Abstract analysis with aspect",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "3",
  pages =        "19--27",
  month =        jul,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/174146.154192",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:48 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Aspect is a static analysis technique for detecting
                 bugs in code based on three forms of abstraction:
                 declarative specification, data abstraction and
                 partiality (ignoring some behavioural details).
                 Together, they bring efficiency (the checker runs
                 almost as fast as a type checker), modularity (a
                 procedure can be analysed independently of the
                 procedures it calls) and incrementality (allowing the
                 checking of incomplete programs). Aspect can detect
                 errors that are not detectable by other static means,
                 especially errors of omission, which are pervasive but
                 usually hard to detect.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Felder:1993:ARS,
  author =       "Miguel Felder and Carlo Ghezzi and Mauro Pezz{\`e}",
  title =        "Analyzing refinements of state based specifications:
                 the case of {TB} nets",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "3",
  pages =        "28--39",
  month =        jul,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/174146.154193",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:48 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "We describe how formal specifications given in terms
                 of a high-level timed Petri net formalism (TB nets) can
                 be analyzed to check the temporal properties of bounded
                 invariance (the systems stays in a given state until
                 time $ \tau $) and bounded response (the system will
                 enter a given state within time $ \tau $). In
                 particular, we concentrate on specifications given in a
                 hierarchical, top-down manner, where one specification
                 level refines a more abstract level. Our goal is to
                 define the conditions under which the properties that
                 are proven to hold at a given abstraction level are
                 preserved at the next refined level. To do so, we
                 define the concept of correct refinement, and we show
                 that bounded invariance and bounded response are
                 preserved by a correct refinement. We also provide a
                 set of constructive rules that may be applied to refine
                 a net in such a way that the resulting net is a correct
                 refinement.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Levine:1993:MDR,
  author =       "David L. Levine and Richard N. Taylor",
  title =        "Metric-driven reengineering for static concurrency
                 analysis",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "3",
  pages =        "40--50",
  month =        jul,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/174146.154196",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:48 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "An approach to statically analyzing a concurrent
                 program not suited for analysis is described. The
                 program is reengineered to reduce the complexity of
                 concurrency-related activities, thereby reducing the
                 size of the concurrency state space. The key to the
                 reengineering process is a metric set that
                 characterizes program task interaction complexity and
                 provides guidance for restructuring. An initial version
                 of a metric set is proposed and applied to two examples
                 to demonstrate the utility of the
                 reengineering-for-analysis process. The reengineering
                 has potential benefits apart from supporting
                 analyzability, following the dictum that if it is hard
                 to analyze, it is hard to understand and maintain.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Duri:1993:USS,
  author =       "S. Duri and U. Buy and R. Devarapalli and S. M.
                 Shatz",
  title =        "Using state space reduction methods for deadlock
                 analysis in {Ada} tasking",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "3",
  pages =        "51--60",
  month =        jul,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/174146.154197",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:48 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/adabooks.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Over the past few years, a number of research
                 investigations have been initiated for static analysis
                 of concurrent and distributed software. In this paper
                 we report on experiments with various optimization
                 techniques for reachability-based deadlock detection in
                 Ada programs using Petri net models. Our experimental
                 results show that various optimization techniques are
                 mutually beneficial with respect to the effectiveness
                 of the analysis.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Vogel:1993:IGP,
  author =       "Peter A. Vogel",
  title =        "An integrated general purpose automated test
                 environment",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "3",
  pages =        "61--69",
  month =        jul,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/174146.154200",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:48 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "As software systems become more and more complex, both
                 the complexity of the testing effort and the cost of
                 maintaining the results of that effort increase
                 proportionately. Most existing test environments lack
                 the power and flexibility needed to adequately test
                 significant software systems. The CONVEX Integrated
                 Test Environment (CITE) is discussed as an answer to
                 the need for a more complete and powerful general
                 purpose automated software test system.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Belli:1993:IBA,
  author =       "B. Belli and O. Jack",
  title =        "Implementation-based analysis and testing of {Prolog}
                 programs",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "3",
  pages =        "70--80",
  month =        jul,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/174146.154203",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:48 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "In this paper, we describe the PROTest II (PROlog Test
                 Environment, Version 2) system to test logic programs
                 in an interactive support environment. Logic programs
                 are augmented with declarative information about the
                 types and modes of the arguments of a predicate. Modes
                 correspond to in, out, and in-out parameters. With this
                 information PROTest II statically checks the types of
                 Prolog programs, generates test cases, executes Prolog
                 programs, and produces reports summarizing results
                 including information about new test coverage metrics.
                 Thus, PROTest II enables both static analysis and
                 dynamic testing uniformly using a Prolog-based test
                 language DTL/1. The strength of PROTest II stems from
                 its idea of defining coverage in real logic programming
                 terms, rather than adapting imperative programming
                 ideas.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Modes:1993:SIV,
  author =       "Ronald W. Modes",
  title =        "Structured {IV} \& {V} for the space shuttle flight
                 software",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "3",
  pages =        "81",
  month =        jul,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/174146.154205",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:48 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Avritzer:1993:LTS,
  author =       "Alberto Avritzer and Brian Larson",
  title =        "Load testing software using deterministic state
                 testing",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "3",
  pages =        "82--88",
  month =        jul,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/174146.154244",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:48 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "In this paper we introduce a new load testing
                 technique called Deterministic Markov State Testing and
                 report on its application. Our approach is called
                 ``deterministic'' because the sequence of test case
                 execution is set at planning time, and ``state
                 testing'' because each test case certifies a unique
                 software state. There are four main advantages of
                 Deterministic Markov State Testing for system testers:
                 provision of precise software state information for
                 root cause analysis in load test, accommodation for
                 limitations of the system test lab configuration,
                 higher acceleration ratios in system test, and simple
                 management of distributed execution of test cases.
                 System testers using the proposed method have great
                 flexibility in dealing with common system test
                 problems: limited access to the system test
                 environment, unstable software, or changing operational
                 conditions. Because each test case verifies correct
                 execution on a path from the idle state to the software
                 state under test, our method does not require the
                 continuous execution of all test cases. Deterministic
                 Markov State Testing is operational-profile-based, and
                 allows for measurement of software reliability
                 robustness when the operational profile changes.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Hamlet:1993:FSA,
  author =       "Dick Hamlet and Jeff Voas",
  title =        "Faults on its sleeve: amplifying software reliability
                 testing",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "3",
  pages =        "89--98",
  month =        jul,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/174146.154246",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:48 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Most of the effort that goes into improving the
                 quality of software paradoxically does not lead to
                 quantitative, measurable quality. Software developers
                 and quality-assurance organizations spend a great deal
                 of effort preventing, detecting, and removing
                 ``defects'' --- parts of software responsible for
                 operational failure. But software quality can be
                 measured only by statistical parameters like hazard
                 rate and mean time to failure, measures whose
                 connection with defects and with the development
                 process is little understood. At the same time, direct
                 reliability assessment by random testing of software is
                 impractical. The levels we would like to achieve, on
                 the order of 10$^6$ --- 10$^8$ executions without
                 failure, cannot be established in reasonable time. Some
                 limitations of reliability testing can be overcome but
                 the ``ultrareliable'' region above 10$^8$ failure-free
                 executions is likely to remain forever untestable. We
                 propose a new way of looking at the software
                 reliability program. Defect-based efforts should
                 amplify the significance of reliability testing. That
                 is, developers should demonstrate that the actual
                 reliability is better than the measurement. We give an
                 example of a simple reliability-amplification
                 technique, and suggest applications to systematic
                 testing and formal development methods.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Thevenod-Fosse:1993:SAS,
  author =       "P. Th{\'e}venod-Fosse and H. Waeselynck",
  title =        "{STATEMATE} applied to statistical software testing",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "3",
  pages =        "99--109",
  month =        jul,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/174146.154262",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:48 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This paper is concerned with the use of statistical
                 testing as a verification technique for complex
                 software. Statistical testing involves exercising a
                 program with random inputs, the test profile and the
                 number of generated inputs being determined according
                 to criteria based on program structure or software
                 functionality. In case of complex programs, the
                 probabilistic generation must be based on a black box
                 analysis, the adopted criteria being defined from
                 behavior models deduced from the specification. The
                 proposed approach refers to a hierarchical
                 specification produced in the STATEMATE environment.
                 Its feasibility is exemplified on a safety-critical
                 module from the nuclear field, and the efficiency in
                 revealing actual faults is investigated through
                 experiments involving two versions of the module.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Corbett:1993:PTB,
  author =       "J. Corbett and G. Avrunin",
  title =        "A practical technique for bounding the time between
                 events in concurrent real-time systems",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "3",
  pages =        "110--116",
  month =        jul,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/174146.154263",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:48 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Showing that concurrent systems satisfy timing
                 constraints on their behavior is difficult, but may be
                 essential for critical applications. Most methods are
                 based on some form of reachability analysis and require
                 construction of a state space of size that is, in
                 general, exponential in the number of components in the
                 concurrent system. In an earlier paper with L. K.
                 Dillon and J. E. Wileden, we described a technique for
                 finding bounds on the time between events without
                 enumerating the state space, but the technique applies
                 chiefly to the case of logically concurrent systems
                 executing on a uniprocessor, in which events do not
                 overlap in time. In this paper, we extend that
                 technique to obtain upper bounds on the time between
                 events in maximally parallel concurrent systems. Our
                 method does not require construction of the state space
                 and the results of preliminary experiments show that,
                 for at least some systems with large state spaces, it
                 is quite tractable. We also briefly describe the
                 application of our method to the case in which there
                 are multiple processors, but several processes run on
                 each processor.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Atlee:1993:ATR,
  author =       "Joanne M. Atlee and John Gannon",
  title =        "Analyzing timing requirements",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "3",
  pages =        "117--127",
  month =        jul,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/174146.154264",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:48 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Coen-Porisini:1993:CAR,
  author =       "Alberto Coen-Porisini and Richard A. Kemmerer",
  title =        "The composability of {ASTRAL} realtime
                 specifications",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "3",
  pages =        "128--138",
  month =        jul,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/174146.154271",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:48 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "ASTRAL is a formal specification language for realtime
                 systems. It is intended to support formal software
                 development, and therefore has been formally defined.
                 In ASTRAL a realtime system is modeled by a collection
                 of state machine specifications and a single global
                 specification. This paper focuses on extending the
                 ASTRAL methodology to allow the composition of ASTRAL
                 system specifications into specifications of larger and
                 more complex systems. The ASTRAL language includes
                 structuring mechanisms that allow one to build
                 modularized specifications of complex systems with
                 layering. In this paper we concentrate on how to
                 combine these complex system specifications into
                 specifications of even more complex realtime systems.
                 This is accomplished by adding a COMPOSE section to the
                 language that provides the needed information to
                 combine two or more ASTRAL specifications into a single
                 new one. In this paper we also introduce the necessary
                 proof obligations to assure that the assumptions of
                 each of the components of the larger system are
                 satisfied by the other components of the system that
                 replace the previous external environment. We also
                 discuss how some exported transitions become internal
                 transitions of the new system. A telephony example with
                 local central controls that interface to long distance
                 units is used to motivate the extensions.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Untch:1993:MAU,
  author =       "Roland H. Untch and A. Jefferson Offutt and Mary Jean
                 Harrold",
  title =        "Mutation analysis using mutant schemata",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "3",
  pages =        "139--148",
  month =        jul,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/174146.154265",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:48 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Mutation analysis is a powerful technique for
                 assessing and improving the quality of test data used
                 to unit test software. Unfortunately, current automated
                 mutation analysis systems suffer from severe
                 performance problems. This paper presents a new method
                 for performing mutation analysis that uses program
                 schemata to encode all mutants for a program into one
                 metaprogram, which is subsequently compiled and run at
                 speeds substantially higher than achieved by previous
                 interpretive systems. Preliminary performance
                 improvements of over 300\% are reported. This method
                 has the additional advantages of being easier to
                 implement than interpretive systems, being simpler to
                 port across a wide range of hardware and software
                 platforms, and using the same compiler and run-time
                 support system that is used during development and/or
                 deployment.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Weiss:1993:ISA,
  author =       "Stewart N. Weiss and Vladimir N. Fleyshgakker",
  title =        "Improved serial algorithms for mutation analysis",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "3",
  pages =        "149--158",
  month =        jul,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/174146.154266",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:48 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Existing serial algorithms to do mutation analysis are
                 inefficient, and descriptions of parallel mutation
                 systems pre-suppose that these serial algorithms are
                 the best one can do serially. We present a universal
                 mutation analysis data structure and new serial
                 algorithms for both strong and weak mutation analysis
                 that on average should perform much faster than
                 existing ones, and can never do worse. We describe
                 these algorithms as well as the results of our analysis
                 of their run time complexities. We believe that this is
                 the first paper in which analytical methods have been
                 applied to obtain the run time complexities of mutation
                 analysis algorithms.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Miller:1993:EST,
  author =       "Edward F. Miller",
  title =        "Exploitation of software test technology",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "3",
  pages =        "159",
  month =        jul,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/174146.154267",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:48 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Harrold:1993:ECP,
  author =       "Mary Jean Harrold and Brian Malloy and Gregg
                 Rothermel",
  title =        "Efficient construction of program dependence graphs",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "3",
  pages =        "160--170",
  month =        jul,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/174146.154268",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:48 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/gnu.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "We present a new technique for constructing a program
                 dependence graph that contains a program's control
                 flow, along with the usual control and data dependence
                 information. Our algorithm constructs a program
                 dependence graph while the program is being parsed. For
                 programs containing only structured transfers of
                 control, our algorithm does not require information
                 provided by the control flow graph or post dominator
                 tree and therefore obviates the construction of these
                 auxiliary graphs. For programs containing explicit
                 transfers of control, our algorithm adjusts the partial
                 control dependence subgraph, constructed during the
                 parse, to incorporate exact control dependence
                 information. There are several advantages to our
                 approach. For many programs, our algorithm may result
                 in substantial savings in time and memory since our
                 construction of the program dependence graph does not
                 require the auxiliary graph. Furthermore, since we
                 incorporate control and data flow as well as exact
                 control dependence information into the program
                 dependence graph, our graph has a wide range of
                 applicability. We have implemented our algorithm by
                 incorporating it into the Free Software Foundation's
                 GNU C compiler; currently we are performing experiments
                 that compare our technique with the traditional
                 approach.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Goradia:1993:DIA,
  author =       "Tarak Goradia",
  title =        "Dynamic impact analysis: a cost-effective technique to
                 enforce error-propagation",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "3",
  pages =        "171--181",
  month =        jul,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/174146.154269",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:48 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This paper introduces dynamic impact analysis as a
                 cost-effective technique to enforce the
                 error-propagation condition for detecting a fault. The
                 intuition behind dynamic impact analysis is as follows.
                 In a specific test-case, if an execution of a syntactic
                 component has a strong impact on the program output and
                 if the output is correct, then the value of that
                 component-execution is not likely to be erroneous. To
                 capture this intuition in a theoretical framework the
                 notion of impact is formally defined and the concept of
                 impact strength is proposed as a quantitative measure
                 of the impact. In order to provide an infrastructure
                 supporting the computation of impact strengths, program
                 impact graphs and execution impact graphs are
                 introduced. An empirical study validating the
                 computation of impact strengths is presented. It is
                 shown that the impact strengths computed by dynamic
                 impact analysis provide reasonable estimates for the
                 error-sensitivity with respect to the output except
                 when the impact is via one or more error-tolerant
                 components of the program. Potential applications of
                 dynamic impact analysis in the area of mutation testing
                 and dynamic program slicing are discussed.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Thompson:1993:IFM,
  author =       "Margaret C. Thompson and Debra J. Richardson and Lori
                 A. Clarke",
  title =        "An information flow model of fault detection",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "3",
  pages =        "182--192",
  month =        jul,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/174146.154270",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:48 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "RELAY is a model of how a fault causes a failure on
                 execution of some test datum. This process begins with
                 introduction of an original state potential failure at
                 a fault location and continues as the potential
                 failure(s) transfers to output. Here we describe the
                 second stage of this process, transfer of an incorrect
                 intermediate state from a faulty statement to output.
                 Transfer occurs along information flow chains, where
                 each link in the chain involves data dependence
                 transfer and/or control dependence transfer. RELAY
                 models concurrent transfer along multiple information
                 flow chains with transfer sets, which identify possible
                 interaction between potential failures, and with
                 transfer routes, which identify actual interactions.
                 Transfer sets, transfer routes, and control dependence
                 transfer are unique to the RELAY model. The model
                 demonstrates that the process of potential failure
                 transfer is extremely complex and full analysis of real
                 programs may not be practical. Nonetheless, RELAY
                 provides insight into testing and fault detection and
                 suggests an approach to fault-based testing and
                 analysis that may be warranted for critical systems
                 software.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Notkin:1993:NHR,
  author =       "David Notkin",
  title =        "{Nico Habermann} remembered",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "4",
  pages =        "1",
  month =        oct,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/163626.163627",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:49 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Starke:1993:URI,
  author =       "Gernot Starke",
  title =        "Urgent research issues in software process
                 engineering",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "4",
  pages =        "13--15",
  month =        oct,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/163626.163628",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:49 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This paper outlines the major problems and research
                 directions in software process engineering. These
                 problems concern the terminology and language of
                 models; the difference between type and instance; the
                 inherent reflexivity of detailed process models and the
                 dynamic aspects of process models. Furthermore human
                 factors are shown to impose major difficulties on
                 process engineers.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Rine:1993:NSE,
  author =       "David Rine",
  title =        "A note on software engineering, software systems
                 engineering and software design",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "4",
  pages =        "16--18",
  month =        oct,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/163626.163629",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:49 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Hefley:1993:CCA,
  author =       "William E. Hefley",
  title =        "The {Cobbler}'s children: applying total quality
                 management to business process improvement, information
                 engineering and software engineering",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "4",
  pages =        "19--25",
  month =        oct,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/163626.163630",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:49 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This paper describes an approach to, and the
                 relationship among, Business Process Improvement,
                 Business Case Analysis, Information Engineering, and
                 Total Quality Management. This approach is shown to not
                 only complement existing software engineering
                 approaches; but to also provide a framework for
                 implementing continuous improvement processes focused
                 on improving the quality of the organization's
                 processes, services and products.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Conradi:1993:CFE,
  author =       "Reidar Conradi and Christer Fernstr{\"o}m and Alfonso
                 Fuggetta",
  title =        "A conceptual framework for evolving software
                 processes",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "4",
  pages =        "26--35",
  month =        oct,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/163626.163631",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:49 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Software processes are complex entities that may last
                 for long periods of time and are carried out through
                 the interaction of humans and computerized tools. They
                 need to continuously evolve in order to cope with
                 different kinds of changes or customizations both in
                 the organization and in the technologies used to
                 support software production activities. In recent
                 years, many software process support technologies have
                 been developed, and have currently been further
                 extended and used in trial projects. Moreover, some
                 research prototypes have generated commercial products,
                 that are marketed and currently used in industrial
                 organizations. Despite these significant efforts and
                 results, however, there is still little conceptual
                 characterization and assessment of the properties of
                 software processes and related support environments. It
                 is difficult to compare and assess existing approaches.
                 Even a common characterization of the problems to be
                 addressed seems to be problematic and difficult to
                 achieve. This is particularly true when we consider the
                 process evolution problem, for which it does not seem
                 that a common view of the issue has been established
                 yet. This paper aims at proposing a conceptual
                 framework to describe and assess flexible and evolving
                 software processes. It is based on the assumption that
                 a software process is composed of two main components:
                 a software production process to carry out software
                 production activities, and a software meta-process to
                 improve and evolve the whole software process. The
                 general requirements and properties of the process
                 domain are first discussed, and the meta-process
                 concept is introduced. Then, we discuss several process
                 related concepts and, in particular, the relationship
                 between the meta-process and the rest of the software
                 process. Methods and technologies needed to support the
                 meta-process are highlighted and discussed. Finally, we
                 apply the resulting framework to an example, in order
                 to show the potential and expected benefits of the
                 proposed approach.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Steward:1993:SSM,
  author =       "Donald V. Steward",
  title =        "A simple straightforward method for software
                 development",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "4",
  pages =        "36--43",
  month =        oct,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/163626.163632",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:49 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This article presents a method that greatly simplifies
                 software development even while providing a richer
                 description of the system being developed. One tree
                 like structure captures the configuration of the
                 product throughout the whole development process. This
                 avoids the much criticized 'chasm' between analysis and
                 design [2] and gives complete traceability and
                 measurability from requirements to code. It provides
                 for the rich description of interfaces particularly
                 important for large systems. Although the system is
                 documented as a tree structure. it can be used with
                 top-down, bottom-up, object oriented and formal styles
                 of development. It can be tried and evaluated quite
                 easily using a conventional outline processor, which
                 allows one to show just the level of detail of whatever
                 part one wishes to see. This article will start out by
                 showing how you can use the basic method, then
                 successively add more features to demonstrate the
                 ramifications of this simple idea.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Vazquez:1993:UOO,
  author =       "Federico Vazquez",
  title =        "Using object oriented structured development to
                 implement a hybrid system",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "4",
  pages =        "44--53",
  month =        oct,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/163626.163633",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:49 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Object Oriented Analysis, Design and Programming are
                 increasingly impacting the development approach to
                 Computer Systems. Although these methodologies are not
                 new, their use in industry is increasing and they have
                 had a large impact in both System Analysis and System
                 Design. Some People think that object oriented
                 techniques will be the new predominant methodologies
                 used in the 90s and there is no relationship with
                 Structured Design. Others believe that there is indeed
                 a relationship between Structured Analysis and Object
                 Oriented Design. During my work with the development of
                 computer systems I have found a certain degree of
                 compatibility between Object Oriented Analysis and
                 Structured Analysis. I did not however find
                 compatibility between Structured Design and Object
                 Oriented Design. This paper deals with the use of both
                 techniques in a successful system development effort
                 with a hybrid approach. It is possible to work with
                 hybrid systems where object Oriented and Structured
                 development are combined and complement each other.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Henderson-Sellers:1993:MOO,
  author =       "B. Henderson-Sellers and J. M. Edwards",
  title =        "The {O-O-O} methodology for the object-oriented life
                 cycle",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "4",
  pages =        "54--60",
  month =        oct,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/163626.163634",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:49 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{McGregor:1993:NIS,
  author =       "John D. McGregor and Douglas M. Dyer",
  title =        "A note on inheritance and state machines",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "4",
  pages =        "61--69",
  month =        oct,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/163626.163635",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:49 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The inheritance relationships in an object-oriented
                 program have been shown to be a natural structure for
                 facilitating reuse in a number of areas such as test
                 cases. This note reports on a technique for
                 incrementally building the state machine for a class
                 from the state machines of its base classes. Using a
                 style of state diagram similar to object charts
                 provides a graphical means of displaying the resulting
                 state machine. This incremental technique allows more
                 complex machines to be built with less effort.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Cheng:1993:ISR,
  author =       "Jingwen Cheng",
  title =        "Improving the software reusability in object-oriented
                 programming",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "4",
  pages =        "70--74",
  month =        oct,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/163626.163636",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:49 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "One of the promises which OOP (Object-Oriented
                 Programming) holds is that it enhances software
                 reusability. Indeed, software components designed in
                 OOP is easier to be reused than those designed in
                 conventional programming. But the state-of-the-art
                 software reusability in most OOP environments is still
                 very limited. This paper examines how OOP enhances
                 software reusability, what are the limitations of
                 software reuse in current state, and how to improve
                 software reusability.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Poulin:1993:ISS,
  author =       "Jeffrey S. Poulin",
  title =        "Integrated support for software reuse in
                 Computer-Aided Software Engineering {(CASE)}",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "4",
  pages =        "75--82",
  month =        oct,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/163626.163637",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:49 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The success and acceptance of reuse tools and
                 libraries depends on their integration into existing
                 software development environments. However, the
                 addition of large libraries of reusable components to
                 software design databases only exacerbates the problem
                 of design data management. Object-oriented databases
                 originated to meet the requirements of design data
                 management that relational databases could not satisfy.
                 This paper describes a semantic data model for an
                 object-oriented database supporting an integrated
                 Computer Aided Software Engineering environment (CASE).
                 The data model promotes reuse by providing objects that
                 match program design requirements to existing
                 components in the reuse library.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Lott:1993:PMS,
  author =       "Christopher M. Lott",
  title =        "Process and measurement support in {SEEs}",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "4",
  pages =        "83--93",
  month =        oct,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/163626.163638",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:49 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Software evolution processes are well-known to be
                 difficult to manage. Some software engineering
                 environments (SEEs) can use models of these processes
                 to guide their enaction. A few of these SEEs can
                 additionally collect and use measurement data to guide
                 processes precisely. Measurement-based guidance is
                 intended to improve the manageability of the guided
                 processes. This paper contributes an overview of many
                 process-centered SEEs, with special emphasis on those
                 that support the systematic collection of process,
                 product, and resource data for the purpose of process
                 guidance.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Edelstein:1993:RIS,
  author =       "D. Vera Edelstein",
  title =        "Report on the {IEEE STD 1219--1993} --- standard for
                 software maintenance",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "4",
  pages =        "94--95",
  month =        oct,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/163626.163639",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:49 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Hoare:1993:AM,
  author =       "C. A. R. Hoare",
  title =        "Algebra and models",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "5",
  pages =        "1--8",
  month =        dec,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/167049.167053",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:50 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Science makes progress by constructing mathematical
                 models, deducing their observable consequences, and
                 testing them by experiment. Successful theoretical
                 models are later taken as the basis for engineering
                 methods and codes of practice for design of reliable
                 and useful products. Models can play a similar central
                 role in the progress and practical application of
                 Computing Science.A model of a computational paradigm
                 starts with choice of a carrier set of potential direct
                 or indirect observations that can be made of a
                 computational process. A particular process is modelled
                 as the subset of observations to which it can give
                 rise. Process composition is modelled by relating
                 observations of a composite process to those of its
                 components. Indirect observations play an essential
                 role in such compositions. Algebraic properties of the
                 composition operators are derived with the aid of the
                 simple theory of sets and relations. Feasibility is
                 checked by a mapping from a more operational model.A
                 model constructed as a family of sets is easily adapted
                 as a calculus of design for total correctness. A
                 specification is given by an arbitrary set containing
                 all observations permitted in the required product. It
                 should be expressed as clearly as possible with the aid
                 of the full power of mathematics and logic. A product
                 meets a specification if its potential observations
                 form a subset of its permitted observations. This
                 principle requires that all envisaged failure modes of
                 a product are modelled as indirect observations, so
                 that their avoidance can be proved. Specifications of
                 components can be composed mathematically by the same
                 operators as the components themselves. This permits
                 top-down proof of correctness of designs even before
                 their implementation begins. Algebraic properties and
                 reasoning are helpful throughout development.
                 Non-determinism is seen as no problem, but rather as a
                 part of the solution.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Abowd:1993:USU,
  author =       "Gregory Abowd and Robert Allen and David Garlan",
  title =        "Using style to understand descriptions of software
                 architecture",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "5",
  pages =        "9--20",
  month =        dec,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/167049.167055",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:50 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The software architecture of most systems is described
                 informally and diagrammatically. In order for these
                 descriptions to be meaningful at all, figures are
                 understood by interpreting the boxes and lines in
                 specific, conventionalized ways[5]. The imprecision of
                 these interpretations has a number of limitations. In
                 this paper we consider these conventionalized
                 interpretations as architectural styles and provide a
                 formal framework for their uniform definition. In
                 addition to providing a template for precisely defining
                 new architectural styles, this framework allows for the
                 proof that the notational constraints on a style are
                 sufficient to guarantee the meanings of all described
                 systems and provides a unified semantic base through
                 which different stylistic interpretations can be
                 compared.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Balzer:1993:MGP,
  author =       "Robert Balzer and K. Narayanaswamy",
  title =        "Mechanisms for generic process support",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "5",
  pages =        "21--32",
  month =        dec,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/167049.167058",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:50 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "As more and more programming environments incorporate
                 explicit process descriptions, generic process
                 capabilities will become crucial to the convenient
                 instantiation and maintenance of process description.
                 However, partly because process modeling languages have
                 followed the example of programming languages in
                 general, they are surprisingly weak in supporting
                 generic process descriptions. We propose mechanisms
                 whereby generic process capability can be added to any
                 process formalism. The generic portions of the process
                 description can then be refined through instantiation.
                 We define a system architecture in which a generic
                 process description can be refined gradually during its
                 enactment. Such capabilities will be crucial to
                 incorporating explicit process descriptions into the
                 program environments of the future.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Magnusson:1993:FGR,
  author =       "Boris Magnusson and Ulf Asklund and Sten Min{\"o}r",
  title =        "Fine-grained revision control for collaborative
                 software development",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "5",
  pages =        "33--41",
  month =        dec,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/167049.167061",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:50 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This paper presents a framework for controlling the
                 evolution of complex software systems concurrently
                 developed by teams of software engineers. A general
                 technique for fine-grained revision control of
                 hierarchically structured information, such as programs
                 and documents, is described and evaluated. All levels
                 in the hierarchy are revision controlled, leaves as
                 well as branch nodes. The technique supports sharing of
                 unchanged nodes among revisions, automatic change
                 propagation, and change-oriented representation of
                 differences. Its use in a software development
                 environment is presented, facilitating optimistic
                 check-out of revisions and alternatives, check-in with
                 incremental merge support, visualization of change
                 propagation, and an integrated flexible diff-ing
                 technique providing group awareness for team members.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Griswold:1993:DUD,
  author =       "William G. Griswold",
  title =        "Direct update of data flow representations for a
                 meaning-preserving program restructuring tool",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "5",
  pages =        "42--55",
  month =        dec,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/167049.167063",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:50 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Automated assistance for meaning-preserving global
                 restructuring is an approach for helping software
                 engineers improve the structure of programs, thus
                 lowering the costs of maintenance. The construction of
                 a restructuring tool encounters many conflicting goals
                 --- such as simplicity. extensibility, and good
                 performance --- that cannot be met without some
                 compromise. In particular, the current technique for
                 assisting restructuring uses a costly program
                 representation --- a Program Dependence Graph (PDG)
                 with alias information --- that is not practical to
                 recompute from scratch after each restructuring
                 transformation. There are at least two possible
                 solutions. A commonly suggested approach for
                 efficiently updating data flow representations is to
                 use a generic incremental algorithm that does not make
                 use of the special nature of the restructuring. This
                 approach is general, but it does not yet handle
                 aliasing fully. By taking advantage of the special
                 nature of the restructuring transformations it is
                 possible to implement a more efficient update than
                 generic update that also handles aliasing. The idea is
                 to implement direct updates to the PDG that are
                 analogous to the changes on the program text. The
                 downsides to direct update are that it is
                 application-specific, applies only to semantically
                 restricted applications like restructuring, and may be
                 more complex. The choice between the two techniques
                 requires an understanding of the current and future
                 needs of the tool's users. This paper describes the
                 direct approach of updating the PDG and related
                 representations for restructuring, provides techniques
                 for managing its complexity, critiques its advantages
                 and shortcomings relative to generic incremental
                 update, and presents performance results.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Tarr:1993:POM,
  author =       "Peri Tarr and Lori A. Clarke",
  title =        "{PLEIADES}: an object management system for software
                 engineering environments",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "5",
  pages =        "56--70",
  month =        dec,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/167049.167065",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:50 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Software engineering environments impose challenging
                 requirements on the design and implementation of an
                 object management system. Existing object management
                 systems have been limited in both the kinds of
                 functionality they have provided and in the models of
                 support they define. This paper describes a system,
                 called PLEIADES, which provides many of the object
                 management capabilities required to support software
                 engineering environments.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Cai:1993:TIP,
  author =       "Jiazhen Cai and Robert Paige",
  title =        "Towards increased productivity of algorithm
                 implementation",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "5",
  pages =        "71--78",
  month =        dec,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/167049.167067",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:50 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This paper reports experimental results that support
                 the feasibility of a new transformational approach
                 developed by the authors for implementing complex
                 algorithms correctly and efficiently. The class of
                 algorithms amenable to our methods includes
                 nonnumerical graph algorithms. Experiments were
                 performed to measure how this approach affects
                 productivity (in terms of the number of source lines in
                 the implementation divided by manual programming time)
                 and running times. Comparative benchmarks showed that
                 productivity can be increased over a conventional ad
                 hoc approach by factors ranging from 5.1 to 9.9
                 Preliminary results also showed that the running time
                 of C code produced by this new approach can be as fast
                 as 1.5 times that of tightly coded high quality
                 Fortran.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Wood:1993:PAS,
  author =       "Kenneth R. Wood",
  title =        "A practical approach to software engineering using Z
                 and the refinement calculus",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "5",
  pages =        "79--88",
  month =        dec,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/167049.167068",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:50 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "We present a methodology for the formal specification
                 and development of software systems using Z and the
                 refinement calculus. The methodology combines the data
                 structuring capabilities and the codified discrete
                 mathematics of Z with the data encapsulation properties
                 and development style of the refinement calculus, and
                 it aims to provide a formal path from design to
                 implementation without unnecessary transformations of
                 notation or the definition of a new calculus. It is
                 illustrated here by the development of two systems, a
                 simply diary and (part of) a text editor, and is
                 contrasted with the use of Z on its own. We discuss
                 related and future work and conclude with some general
                 comments on applied formal methods.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Carrington:1993:DMD,
  author =       "David Carrington and David Duke and Ian Hayes and Jim
                 Welsh",
  title =        "Deriving modular designs from formal specifications",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "5",
  pages =        "89--98",
  month =        dec,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/167049.167066",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:50 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "We consider the problem of designing the top-level
                 modular structure of an implementation. Our starting
                 point is a formal specification of the system. Our
                 approach is to analyse the references to the state
                 variables by the operations of the system. Operations
                 that reference/modify similar sets of variables are
                 likely candidates for grouping into a module. We
                 evaluate the strategy by applying it to a large Z
                 specification of a language-based editor.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Lutz:1993:TSR,
  author =       "Robyn R. Lutz",
  title =        "Targeting safety-related errors during software
                 requirements analysis",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "5",
  pages =        "99--106",
  month =        dec,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/167049.167069",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:50 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This paper provides a Safety Checklist for use during
                 the analysis of software requirements for spacecraft
                 and others safety-critical, embedded systems. The
                 checklist specifically targets the two most common
                 causes of safety-related software errors: (1)
                 inadequate interface requirements and (2) discrepancies
                 between the documented requirements and the
                 requirements actually needed for correct functioning of
                 the system. The analysis criteria represented in the
                 checklist are evaluated by application to two
                 spacecraft projects. Use of the checklist to enhance
                 the software-requirements analysis is shown to reduce
                 the number of safety-related software errors.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Votta:1993:DEI,
  author =       "Lawrence G. {Votta, Jr.}",
  title =        "Does every inspection need a meeting?",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "5",
  pages =        "107--114",
  month =        dec,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/167049.167070",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:50 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "At each step in large software development, reviewers
                 carry out inspections to detect faults. These
                 inspections are usually followed by a meeting to
                 collect the faults that have been discovered. However,
                 we have found that these inspection meetings are not as
                 beneficial as managers and developers think they are.
                 Even worse, they cost much more in terms of products
                 development interval and developer's time than anyone
                 realizes. Analysis of the inspection and collection
                 process leads us to make the following suggestions.
                 First, at the least, the number of participants
                 required at each inspection meeting should be
                 minimized. Second, we propose two alternative fault
                 collection methods, either of which would eliminate the
                 inspection meetings altogether: (a) collect faults by
                 deposition (small face-to-face meetings of two or three
                 persons), or (b) collect faults using verbal or written
                 media (telephone, electronic mail, or notes). We
                 believe that such a change in procedure would increase
                 efficiency by reducing production times without
                 sacrificing product quality.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Cheung:1993:ECR,
  author =       "S. C. Cheung and J. Kramer",
  title =        "Enhancing compositional reachability analysis with
                 context constraints",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "5",
  pages =        "115--125",
  month =        dec,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/167049.167071",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:50 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Compositional techniques have been proposed for
                 traditional reachability analysis in order to introduce
                 modularity and to control the state explosion problem.
                 While modularity has been achieved, state explosion is
                 still a problem. Indeed, this problem may even be
                 exacerbated as a locally minimised subsystem may
                 contain many states and transitions forbidden by its
                 context or environments. This paper presents a method
                 to alleviate this problem effectively by including
                 context constraints in local subsystem minimisation.
                 The global behaviour generated using the method is
                 observationally equivalent to that generated by
                 compositional reachability analysis without the
                 inclusion of context constraints. Context constraints,
                 specified as interface processes, are restrictions
                 imposed by the environment on subsystem behaviour. The
                 minimisation produces a simplified machine that
                 describes the behaviour of the subsystem constrained by
                 its context. This machine can also be used as a
                 substitute for the original subsystem in the subsequent
                 steps of the compositional reachability analysis.
                 Interface processes capturing context constraints can
                 be specified by users or automatically constructd using
                 a simple algorithm. The concepts in the paper are
                 illustrated with a clients/server system.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Bahsoun:1993:FPF,
  author =       "Jean Paul Bahsoun and Stephan Merz and Corinne
                 Servieres",
  title =        "A framework for programming and formalizing concurrent
                 objects",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "5",
  pages =        "126--137",
  month =        dec,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/167049.167072",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:50 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "We propose an object-oriented programming model based
                 on concurrently executing communicating agents which
                 aims to achieve reusability and extensibility of agent
                 descriptions by separating aspects of functionality and
                 synchronization. A formal semantics of an agent is
                 given as a theory in the Temporal Logic of Actions [15]
                 such that a system of agents is formalized by the
                 conjunction of the single agents' specifications plus
                 some axioms representing the communication structure.
                 This representation allows for the formal derivation of
                 systems properties. We terminate this paper by a
                 discussion about the proof of inheritance properties in
                 a parallel environment.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Turpin:1993:LAD,
  author =       "Russell Turpin",
  title =        "A logical approach to data structures",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "5",
  pages =        "138--148",
  month =        dec,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/167049.167073",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:50 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The Galois project at the University of Texas is
                 building a programming environment that supports the
                 formal development and verification of data structure
                 programs. This programming environment supports
                 features such as pointer manipulation and destructive
                 update that often make formal treatment difficult.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Bergadano:1993:TCG,
  author =       "F. Bergadano",
  title =        "Test case generation by means of learning techniques",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "5",
  pages =        "149--162",
  month =        dec,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/167049.167074",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:50 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Given a program P and a set of alternative programs P,
                 we generate a sequence of test cases that are adequate,
                 in the sense that they distinguish the given program
                 from all alternatives. The method is related to
                 fault-based approaches to program testing, but programs
                 in P need not be simple mutations of P. The technique
                 for generating an adequate test set is based on the
                 inductive learning of programs from finite sets of
                 input-output examples: given a partial test set, we
                 generate inductively a program P' E P which is
                 consistent with P on those input values; then we look
                 for an input value that distinguishes P from P', and
                 repeat the process until no program except P can be
                 induced from the generated examples. We show that the
                 so obtained test set is adequate w.r.t. the
                 alternatives belonging to P. The method is made
                 possible by a practical program induction procedure,
                 which has evolved from recent research in Machine
                 Learning and Inductive Logic Programming.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Gustafson:1993:SMS,
  author =       "David A. Gustafson and Joo T. Tan and Perla Weaver",
  title =        "Software measure specification",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "5",
  pages =        "163--168",
  month =        dec,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/167049.167075",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:50 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This paper introduces the model-order-mapping (MOM)
                 approach for specifying software/document measures. A
                 MOM specification requires that the important
                 attributes of the document be identified, a model that
                 captures the attributes be chosen, and a mapping from
                 the document to the model be specified. A partial
                 ordering on the model must be developed as well as an
                 order-preserving mapping from the model to an answer
                 set. The relationship of the approach to measurement
                 theory is shown. Validation of the MOM specification is
                 presented. Properties of software measures that are
                 guaranteed by a validated MOM specification and those
                 that can be proved from a validated specification are
                 described.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Podgurski:1993:PTS,
  author =       "Andy Podgurski and Charles Yang",
  title =        "Partition testing, stratified sampling, and cluster
                 analysis",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "5",
  pages =        "169--181",
  month =        dec,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/167049.167076",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:50 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "We present a new approach to reducing the manual labor
                 required to estimate software reliability. It combines
                 the ideas of partition testing methods with those of
                 stratified sampling to reduce the sample size necessary
                 to estimate reliability with a given degree of
                 precision. Program executions are stratified by using
                 automatic cluster analysis to group those with similar
                 features. We describe the conditions under which
                 stratification is effective for estimating software
                 reliability, and we present preliminary experimental
                 results suggesting that our approach may work well in
                 practice.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Zaremski:1993:SMK,
  author =       "Amy Moormann Zaremski and Jeannette M. Wing",
  title =        "Signature matching: a key to reuse",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "5",
  pages =        "182--190",
  month =        dec,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/167049.167077",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:50 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Software reuse is only effective if it is easier to
                 locate (and appropriately modify) a reusable component
                 than to write it from scratch. We present signature
                 matching as a method for achieving this goal by using
                 signature information easily derived from the
                 component. We consider two kinds of software
                 components, functions and modules, and hence two kinds
                 of matching, function matching and module matching. The
                 signature of a function is simply its type; the
                 signature of a module is a multiset of user-defined
                 types and a multiset of function signatures. For both
                 functions and modules, we consider not just exact
                 match, but also various flavors of relaxed match. We
                 briefly describe an experimental facility written in
                 Standard ML for performing signature matching over a
                 library of ML functions.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Batory:1993:SSL,
  author =       "Don Batory and Vivek Singhal and Marty Sirkin and Jeff
                 Thomas",
  title =        "Scalable software libraries",
  journal =      j-SIGSOFT,
  volume =       "18",
  number =       "5",
  pages =        "191--199",
  month =        dec,
  year =         "1993",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/167049.167078",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:50 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Many software libraries (e.g., the Booch C++
                 Components, libg++, NIHCL, COOL) provide components
                 (classes) that implement data structures. Each
                 component is written by hand and represents a unique
                 combination of features (e.g. concurrency, data
                 structure, memory allocation algorithms) that
                 distinguishes it from other components. We argue that
                 this way of building data structure component libraries
                 is inherently unscalable. Libraries should not
                 enumerate complex components with numerous features;
                 rather, libraries should take a minimalist approach:
                 they should provide only primitive building blocks and
                 be accompanied by generators that can combine these
                 blocks to yield complex custom data structures. In this
                 paper, we describe a prototype data structure generator
                 and the building blocks that populate its library. We
                 also present preliminary experimental results which
                 suggest that this approach does not compromise
                 programmer productivity nor the run-time performance of
                 generated data structures.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Neumann:1994:IRP,
  author =       "Peter G. Neumann",
  title =        "Illustrative risks to the public in the use of
                 computer systems and related technology",
  journal =      j-SIGSOFT,
  volume =       "19",
  number =       "1",
  pages =        "16--29",
  month =        jan,
  year =         "1994",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/181610.181612",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:52 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Kilov:1994:UHL,
  author =       "Haim Kilov",
  title =        "On understanding hypertext: are links essential?",
  journal =      j-SIGSOFT,
  volume =       "19",
  number =       "1",
  pages =        "30",
  month =        jan,
  year =         "1994",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/181610.181614",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:52 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Kontogiannis:1994:REQ,
  author =       "Kostas A. Kontogiannis and Scott R. Tilley",
  title =        "Reverse engineering questionnaire",
  journal =      j-SIGSOFT,
  volume =       "19",
  number =       "1",
  pages =        "31--38",
  month =        jan,
  year =         "1994",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/181610.181615",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:52 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This is a questionnaire on program understanding and
                 reverse engineering. It may be filled out manually or
                 on-line. The results of the questionnaire will be used
                 to guide the research of the two authors, both of whom
                 are Ph.D. students working in this area. Copies of the
                 resulting report will be mailed to all who participate,
                 and a summary of the results will be published in an
                 appropriate forum.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Lea:1994:CAI,
  author =       "Doug Lea",
  title =        "{Christopher Alexander}: an introduction for
                 object-oriented designers",
  journal =      j-SIGSOFT,
  volume =       "19",
  number =       "1",
  pages =        "39--46",
  month =        jan,
  year =         "1994",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/181610.181617",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:52 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Apte:1994:PMS,
  author =       "Kishor Apte",
  title =        "Problem management system: experience and insights",
  journal =      j-SIGSOFT,
  volume =       "19",
  number =       "1",
  pages =        "53--54",
  month =        jan,
  year =         "1994",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/181610.181619",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:52 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Poulin:1994:WAW,
  author =       "Jeff Poulin and Will Tracz",
  title =        "{WISR'93: 6th Annual Workshop on Software Reuse}:
                 summary and working group reports",
  journal =      j-SIGSOFT,
  volume =       "19",
  number =       "1",
  pages =        "55--71",
  month =        jan,
  year =         "1994",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/181610.181620",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:52 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Sefcik:1994:CSF,
  author =       "John G. Sefcik",
  title =        "Critical success factors for implementing software
                 quality plans",
  journal =      j-SIGSOFT,
  volume =       "19",
  number =       "1",
  pages =        "72--74",
  month =        jan,
  year =         "1994",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/181610.181622",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:52 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Mamone:1994:ISS,
  author =       "Salvatore Mamone",
  title =        "The {IEEE} standard for software maintenance",
  journal =      j-SIGSOFT,
  volume =       "19",
  number =       "1",
  pages =        "75--76",
  month =        jan,
  year =         "1994",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/181610.181623",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:52 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Maintenance, traditionally the last phase of the
                 Software Life Cycle, is usually overlooked, under
                 documented, and never appreciated. Maintenance is
                 usually thought of as ``something that's done after the
                 work is done'' and is usually delegated to junior
                 programmers. As a result the modified system can many
                 times contain more defects that the original system.
                 This article will describe the Software Maintenance
                 Standard and how it can provide the foundation for
                 better control of Maintenance.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Roche:1994:SMM,
  author =       "John M. Roche",
  title =        "Software metrics and measurement principles",
  journal =      j-SIGSOFT,
  volume =       "19",
  number =       "1",
  pages =        "77--85",
  month =        jan,
  year =         "1994",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/181610.181625",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:52 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Software measurement is widely advocated as a
                 fundamental constituent of an engineering approach to
                 planning and controlling software development.
                 Unfortunately, there is a dichotomy between the
                 quantity of developed metrics and those used. This
                 paper provides a tutorial review of software
                 engineering measurement indicating the depth and
                 breadth of the field. Individual metrics are not
                 described due to the interest of this paper being on
                 the measurement process and not the products of that
                 process. Generic problems have been identified within
                 existing measurement processes, these provide learning
                 points for the expression of measurement principles.
                 These principles are classified and described according
                 to their position within the formulation, analysis and
                 application stages of measurement. Conclusions are
                 elaborated that suggest that existing measurement
                 frameworks for applying measurement --- often called
                 measurement methods --- do not provide sufficient
                 support for the principles and their continued use will
                 only serve to replicate the problems. In order to
                 improve the products i.e. metrics, the measurement
                 process requires improvement through inclusion of these
                 principles in a new method.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Sharma:1994:FDC,
  author =       "Anil Sharma",
  title =        "Framework to define {CASE} tool requirements for
                 distributed environment",
  journal =      j-SIGSOFT,
  volume =       "19",
  number =       "1",
  pages =        "86--89",
  month =        jan,
  year =         "1994",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/181610.181627",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:52 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "In this paper we develop a framework for requirements
                 definition for a CASE tool which cover all phases of
                 software development life cycle. The resulting
                 requirements are driven through set objectives. Since
                 trend is toward distributed workstation based CASE
                 tools, we would specifically focus on CASE tool
                 requirements for heterogeneous network. These
                 requirement are illustrative and require fine tuning
                 for a specific organisation. But these can be used as a
                 general framework to develop detailed requirement
                 definition. These requirements become the part of
                 general process of evaluating a CASE tool and can be
                 used for example to develop 'Evaluation Check List'.
                 Moreover requirements definitions is not aimed at
                 conceiving a new CASE tool but addresses the issue of
                 what to look for when selecting a CASE tool among many
                 existing.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Saradhi:1994:REI,
  author =       "Motamarri Saradhi",
  title =        "Re-Engineer: If It Wasn't Engineered!",
  journal =      j-SIGSOFT,
  volume =       "19",
  number =       "2",
  pages =        "17",
  month =        apr,
  year =         "1994",
  CODEN =        "SFENDP",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:52 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Garg:1994:SAB,
  author =       "Pankaj K. Garg and Mehdi Jazayeri",
  title =        "Selected, annotated bibliography on process-centered
                 software engineering environments",
  journal =      j-SIGSOFT,
  volume =       "19",
  number =       "2",
  pages =        "18--21",
  month =        apr,
  year =         "1994",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/181628.181630",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:52 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Marovac:1994:GES,
  author =       "Nenad Marovac",
  title =        "Guidelines for embedded software documentation",
  journal =      j-SIGSOFT,
  volume =       "19",
  number =       "2",
  pages =        "22--28",
  month =        apr,
  year =         "1994",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/181628.181632",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:52 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Embedded program documentation, i.e. documentation
                 included in computer programs within program comments,
                 typically does not follow any formal standards or
                 conventions with regards to its contents and structure.
                 Software development organizations do not enforce any
                 standards covering the information content or format of
                 the embedded documentation. At best they may encourage
                 the use of some proprietary rules. It is very common in
                 such organizations that individual programmers have
                 their own individual documentation styles. This is
                 unfortunate since embedded documentation, containing
                 proper information and being properly structured, can
                 greatly assist us in reading and understanding software
                 programs and their individual components during the
                 maintenance of these programs or reuse of their
                 components. Furthermore, the use of embedded
                 documentation can assist in functional decomposition
                 and design of computer programs and in ensuring the
                 consistency of interfaces within programs. The purpose
                 of this document is to report on the schema we use at
                 San Diego State University in software projects and to
                 propose guidelines regarding documentation embedded in
                 computer programs and related documents. We believe
                 that these guidelines will help us to maintain
                 conformity in software documentation in programs
                 developed at SDSU in Software Engineering and
                 MultiMedia Labs. Furthermore, we have developed tools
                 that are based on the proposed embedded documentation
                 and that are used in four areas:1. interactive
                 functional decomposition and design of programs2.
                 automatic incorporation of submitted software into
                 reuse libraries3. conversion of developed software into
                 hypertext like structures that are used to maintain all
                 material related to a software project in a form
                 suitable for inspection, browsing, and updating4.
                 automatic generation of software documentation on
                 demand",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Tomic:1994:PAO,
  author =       "Marijana Tomic",
  title =        "A possible approach to object-oriented reengineering
                 of {Cobol} programs",
  journal =      j-SIGSOFT,
  volume =       "19",
  number =       "2",
  pages =        "29--34",
  month =        apr,
  year =         "1994",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/181628.181633",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:52 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Reengineering is rapidly becoming a recognized and
                 important component of future computer-aided
                 systems-engineering (CASE) environment. This paper
                 presents framework for analyzing Object-Oriented
                 Reengineering process of COBOL programs. The process
                 embody software engineering principles that concern
                 module interactions such as low coupling and high
                 cohesion.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Ponder:1994:PCH,
  author =       "Carl Ponder and Bill Bush",
  title =        "Polymorphism considered harmful",
  journal =      j-SIGSOFT,
  volume =       "19",
  number =       "2",
  pages =        "35--37",
  month =        apr,
  year =         "1994",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/181628.181635",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:52 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Davis:1994:CPM,
  author =       "Alan M. Davis and Pradip Sitaram",
  title =        "A concurrent process model of software development",
  journal =      j-SIGSOFT,
  volume =       "19",
  number =       "2",
  pages =        "38--51",
  month =        apr,
  year =         "1994",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/181628.181637",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:52 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Most published software development models present
                 software engineering as a series of discrete phases.
                 They often capture the ``inevitable intertwining'' of
                 pairs of phases and they often capture the need to
                 return to earlier phases when new information is
                 ascertained. However, in actual software development
                 projects, activities typically associated with multiple
                 phases are performed concurrently. This paper presents
                 a new model of the software development process that
                 effectively captures the concurrency among activities
                 that is in berent in all non-trivial software
                 development. Statecharts are used to present the
                 model.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Tracz:1994:DSS,
  author =       "Will Tracz",
  title =        "Domain-specific software architecture {(DSSA)}
                 frequently asked questions {(FAQ)}",
  journal =      j-SIGSOFT,
  volume =       "19",
  number =       "2",
  pages =        "52--56",
  month =        apr,
  year =         "1994",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/181628.181639",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:52 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The Advanced Research Projects Agency's
                 Domain-Specific Software Architecture (DSSA) Project
                 has been the focal point of much interest in the
                 software engineering community. This paper provides a
                 list of ``Frequently Asked Questions'' (FAQ)$^1$. For a
                 more thorough treatment of DSSA, the reader should
                 consult ``Architecture-Based Acquisition and
                 Development of Software: Guidelines and Recommendations
                 from the ARPA Domain-Specific Software Architecture
                 (DSSA) Program'' by Dr. Frederick Hayes-Roth (see
                 address below).",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Cheng:1994:RBS,
  author =       "Jingwen Cheng",
  title =        "A reusability-based software development environment",
  journal =      j-SIGSOFT,
  volume =       "19",
  number =       "2",
  pages =        "57--62",
  month =        apr,
  year =         "1994",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/181628.181641",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:52 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Software reuse has great potential to improve software
                 development productivity. However, it has had only
                 limited success in practice. This is because that there
                 are non technical factors as well technical ones
                 affecting software reusability. This paper discusses
                 some problems related to software reuse, analyzes some
                 technical supports for software reuse, and introduces a
                 reusability-based software development system which has
                 been prototyped and is under further improvement. The
                 prominent features of the system include: allowing
                 programmers dynamically to put tested working program
                 components (including data objects created at
                 run-times) into the reusable software library, helping
                 programmers produce software specifications,
                 automatically searching for the required components
                 according to users' queries, assisting users to make a
                 query, and allowing users to select the retrieved
                 components and browse their specifications.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Henry:1994:DWR,
  author =       "Joel Henry and Bob Blasewitz",
  title =        "Do we really need {SQA} to produce quality software?:
                 no! well maybe. it depends. yes!",
  journal =      j-SIGSOFT,
  volume =       "19",
  number =       "2",
  pages =        "63--64",
  month =        apr,
  year =         "1994",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/181628.181642",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:52 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Gorecki:1994:YCS,
  author =       "Andrzej Tomasz Gorecki",
  title =        "Is your computer system sub-critical?",
  journal =      j-SIGSOFT,
  volume =       "19",
  number =       "2",
  pages =        "65--67",
  month =        apr,
  year =         "1994",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/181628.181643",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:52 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Favaro:1994:ESS,
  author =       "John Favaro and Yves Coene and Marco Casucci",
  title =        "The {European} Space Software Development Environment
                 Reference Facility Project: a status report",
  journal =      j-SIGSOFT,
  volume =       "19",
  number =       "2",
  pages =        "68--71",
  month =        apr,
  year =         "1994",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/181628.181644",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:52 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The ESSDE Reference Facility Project, whose goal is to
                 provide a uniform, open environment for software
                 development at the European Space Agency (ESA), has
                 just completed the architectural design phase. A
                 software engineering environment based upon the
                 Portable Common Tool Environment (PCTE) interfaces has
                 been specified, including a complete data model
                 supporting all activities and products in the ESA
                 standard software development life cycle. Several
                 issues of much current interest have been addressed
                 including scalability, configurability and the
                 integration of commercial tools into an existing
                 framework.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Jankowski:1994:FCS,
  author =       "David J. Jankowski",
  title =        "The feasibility of {CASE} structured analysis
                 methodology support",
  journal =      j-SIGSOFT,
  volume =       "19",
  number =       "2",
  pages =        "72--82",
  month =        apr,
  year =         "1994",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/181628.181645",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:52 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Feather:1994:SSI,
  author =       "Martin S. Feather and Axel van Lamsweerde",
  title =        "Succeedings of the {Seventh International Workshop on
                 Software Specification and Design}",
  journal =      j-SIGSOFT,
  volume =       "19",
  number =       "3",
  pages =        "18--22",
  month =        jul,
  year =         "1994",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/182824.182826",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:53 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Dyadkin:1994:MP,
  author =       "Lev J. Dyadkin",
  title =        "Multibox parsers",
  journal =      j-SIGSOFT,
  volume =       "19",
  number =       "3",
  pages =        "23--25",
  month =        jul,
  year =         "1994",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/182824.182827",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:53 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/fortran3.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Traditional compiler front end generating tools such
                 as Lex/Yacc assume a front end consisting of two boxes:
                 a lexical box and a syntax box. Lex produces a lexical
                 analyzer using regular expressions as a token
                 description. Yacc generates a syntax analyzer from the
                 LALR grammar for the parsed language. This approach has
                 big problems with such lexically and syntactically
                 complex languages as Fortran. The main reason for these
                 problems is that regular expressions, being equivalent
                 to a right linear grammar, do not have the capability
                 to describe the incredibly complex lexical structure of
                 Fortran. As a result, compiler writers abandon Lex and
                 produce handwritten lexers for Fortran, thus defeating
                 the main purpose of the parser generator, automation.
                 This work solves these problems by introducing a
                 multibox parser, where each lower box modifies its
                 input language to produce a more ``straightened''
                 output language for the higher box. The number of boxes
                 reflects the complexity of the parsed language. For
                 example, Fortran requires more boxes than does C. Each
                 box is represented by an L-attributed translation
                 grammar in simple assignment form with an LL(1) input
                 grammar. LL(1) grammars were chosen for higher speed,
                 smaller size, and because, unlike regular expressions,
                 they can express constructs such as nested parentheses,
                 a capability which is required for parsing Fortran on
                 the lexical level. New operations for the LL(1) machine
                 are added to ensure it is strictly forward moving,
                 without backtracking in the parsed source code. We have
                 extended the LL(1) grammars to ``indexed LL(1)
                 grammars.''This enhancement allows more of the
                 resulting code to be automatically generated, rather
                 than handwritten. New parser generating tools have been
                 developed by us to support this technology. The
                 multibox approach has been implemented in the Lahey
                 Fortran 90 compiler.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Cherry:1994:VSE,
  author =       "George W. Cherry",
  title =        "Visual software engineering with rules",
  journal =      j-SIGSOFT,
  volume =       "19",
  number =       "3",
  pages =        "26--29",
  month =        jul,
  year =         "1994",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/182824.182828",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:53 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Bourque:1994:ISR,
  author =       "Pierre Bourque and Alain Abran",
  title =        "An innovative software reengineering tools workshop
                 --- a test of market maturity and lessons learned",
  journal =      j-SIGSOFT,
  volume =       "19",
  number =       "3",
  pages =        "30--34",
  month =        jul,
  year =         "1994",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/182824.182829",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:53 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Practitioners still feel ill at ease regarding an
                 evaluation process for reengineering tools. To address
                 this issue, a Qu{\'e}bec-based special interest group
                 in software engineering reused a case study workshop
                 format that had been previously implemented to compare
                 CASE products. This case study format had to be
                 substantially modified to allow both vendors and
                 participants to properly position the reengineering
                 tools. For example, the workshop committee had to
                 prepare reengineering frameworks, including a taxonomy
                 of tools as well as legacy system selection criteria
                 for the case study. This article also reports on the
                 challenges met during the project as well as lessons
                 learned: within a context of an immature reengineering
                 market, the time has not yet come for a full real-life
                 case study at an acceptable economic cost.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Zucconi:1994:ICR,
  author =       "Lin Zucconi",
  title =        "Issues concerning re-engineering of legacy software in
                 the federal {R\&D} environment",
  journal =      j-SIGSOFT,
  volume =       "19",
  number =       "3",
  pages =        "35",
  month =        jul,
  year =         "1994",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/182824.182831",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:53 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Vazquez:1994:ICD,
  author =       "Federico Vazquez",
  title =        "Identification of complete data flow diagrams",
  journal =      j-SIGSOFT,
  volume =       "19",
  number =       "3",
  pages =        "36--40",
  month =        jul,
  year =         "1994",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/182824.182832",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:53 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The Structure Design is generated with Data Flow
                 Diagrams (DFD). DFD have been used for more than ten
                 years, and they are still popular. The main drawback of
                 DFD is the lack of mathematical foundation. The great
                 demand for bigger and more sophisticated computer
                 systems makes necessary the formulation of a formal
                 theory for DFD. This theory will provide a way of
                 checking consistency and completeness. Universal
                 Algebra has become a useful and important tool in
                 theoretical computer science. Universal Algebra is used
                 in this paper to represent DFD, to generate DFD, to
                 prove consistency and completeness and to define
                 complete DFD. A process decomposition is defined in
                 strict mathematical way; the famous Birkoff's Variety
                 Theorem is used to prove consistency in the process
                 decomposition; a definition of minimal DFD is given; a
                 relation between Universal Algebra concepts and DFD is
                 defined; and a definition of complete (well-defined)
                 DFD is given. The DFD are defined using basic concepts
                 of Universal Algebra theory. The results from this
                 paper can be incorporated in any of the CASE tools used
                 to generate DFD.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Kilov:1994:FMS,
  author =       "Haim Kilov",
  title =        "Formal methods and standards",
  journal =      j-SIGSOFT,
  volume =       "19",
  number =       "3",
  pages =        "40",
  month =        jul,
  year =         "1994",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/182824.182833",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:53 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Juell:1994:SNR,
  author =       "Paul Juell and Daniel Brekke and Ronald Vetter and
                 John Wasson",
  title =        "Storage and network requirements of a low-cost
                 computer-based virtual classroom",
  journal =      j-SIGSOFT,
  volume =       "19",
  number =       "3",
  pages =        "41--44",
  month =        jul,
  year =         "1994",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/182824.182834",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:53 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "In this paper we investigate the network and storage
                 requirements of a virtual classroom. The virtual
                 classroom replaces traditional class methodologies by
                 using the computer as the sole instrument for all class
                 activity. The instructor and the students each have a
                 networked workstation in an X cluster that provides for
                 the creation, modification, and distribution of
                 presentations, note-taking, capturing of presentation
                 material, out-of-class reviewing of presentation
                 material, and viewing of supplemental materials
                 provided by the instructor (including selected
                 readings, exams, and assignments). We have designed and
                 implemented an virtual classroom as a means of
                 enhancing the teaching/learning process. The creation
                 of this virtual classroom was accomplished by using
                 only existing computing resources: SUN workstations, X
                 tools, an Ethernet network, and UNIX operating system
                 support. Network statistics were collected to determine
                 how well existing networks can be utilized within this
                 environment. We also observed the performance of the
                 system in a realistic setting by using it to teach an
                 Office Information Systems class at North Dakota State
                 University.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Slovin:1994:EEE,
  author =       "Malcolm Slovin and Donn {Di Nunno}",
  title =        "Engineering the enterprise: evolving quality systems",
  journal =      j-SIGSOFT,
  volume =       "19",
  number =       "3",
  pages =        "45--47",
  month =        jul,
  year =         "1994",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/182824.182836",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:53 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Aggarwal:1994:MFS,
  author =       "K. K. Aggarwal and Yogesh Singh",
  title =        "A modified form of software science measures",
  journal =      j-SIGSOFT,
  volume =       "19",
  number =       "3",
  pages =        "48--50",
  month =        jul,
  year =         "1994",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/182824.182837",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:53 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "In attempting to describe the quality of computer
                 software, one of the most frequently mentioned
                 measurable attributes is the complexity of the flow of
                 control. During the past several years, there have been
                 many attempts to quantify this aspect of computer
                 program, approaching the problem from such diverse
                 points of view as graph theory and software science.
                 Existing software science provides a general measure of
                 program complexity, but it fails to adequately quantify
                 program control flow complexity except for the
                 linearization issue. In this paper, weights are
                 assigned to the operators and operands which are part
                 of the control structures. Although similar type of
                 approach was used by Ramamurthy \& Melton for few
                 control structures, there was a need for a generalized
                 approach and this paper is an attempt in this
                 direction.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Dedene:1994:MRM,
  author =       "G. Dedene and M. Snoeck",
  title =        "{M.E.R.O.DE.}: a model-driven entity-relationship
                 object-oriented Development method",
  journal =      j-SIGSOFT,
  volume =       "19",
  number =       "3",
  pages =        "51--61",
  month =        jul,
  year =         "1994",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/182824.182838",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:53 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Object Orientation has as primary goal to improve the
                 software construction process. Object Oriented
                 analysis, design and software construction should yield
                 software of a high quality: software that is reliable,
                 maintainable, extensible, adaptable. However,
                 delivering large OO software systems in a qualitative
                 way is a significant challenge. Scaling up requires
                 formal precision of the semantics of the modelling
                 techniques and languages used by the development team.
                 And when the target system contains an abundance of
                 parallelism, the problem of validation becomes
                 unfeasible if it is not supported by formal techniques.
                 With the incorporation of formal techniques in the
                 development process, we can expect significant benefits
                 in terms of software quality. For this reason, one
                 might expect a high level of formality in current OOAD
                 methods [9]. Unfortunately, most current OOAD methods
                 are characterised by a low level of formality. The
                 M.E.R.O.DE. methodology addresses this void. By making
                 use of algebra, the methodology has been provided with
                 a formal basis at several levels with a significant
                 improvement of the quality of the software development
                 process as a result. Before presenting M.E.R.O.DE. to
                 the reader in the second section, the first section
                 motivates the development of still another OOA method.
                 The final section demonstrates how exactly the formal
                 definition of M.E.R.O.DE. results in a gain of quality
                 at the software specification level.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Castano:1994:FRE,
  author =       "Silvana Castano and Valeria {De Antonellis}",
  title =        "The F3 reuse environment for requirements
                 engineering",
  journal =      j-SIGSOFT,
  volume =       "19",
  number =       "3",
  pages =        "62--65",
  month =        jul,
  year =         "1994",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/182824.182839",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:53 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The F$^3$ reuse environment for supporting the
                 Requirements Engineering process is illustrated and
                 discussed in the paper. In particular, an overview of
                 our approach for building reusable components from
                 existing requirements and for exploiting them in the
                 development of new applications is presented. The
                 approach is based on classification techniques to
                 facilitate extraction of reusable components, and on
                 transformation techniques to support composition of
                 reusable components.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Fuggetta:1994:ABS,
  author =       "Alfonso Fuggetta and Gian Pietro Picco",
  title =        "An annotated bibliography on software process
                 improvement",
  journal =      j-SIGSOFT,
  volume =       "19",
  number =       "3",
  pages =        "66--68",
  month =        jul,
  year =         "1994",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/182824.182841",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:53 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Software process improvement is a critical problem
                 that is currently addressed both at the academic and
                 industrial level. The field is relatively young, and
                 there is no ``ultimate approach'' to the problem. The
                 related scientific literature is rapidly growing, and
                 is more and more difficult to make our way in the
                 plethora of different perspectives, approaches, and
                 case studies. This paper provides a guide to the
                 process improvement literature: we think that both
                 newbies and experts of this field can take advantage
                 from it.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Gossain:1994:USM,
  author =       "Sanjiv Gossain",
  title =        "Using the {Shlaer--Mellor} method to support a level 4
                 software process",
  journal =      j-SIGSOFT,
  volume =       "19",
  number =       "3",
  pages =        "69--74",
  month =        jul,
  year =         "1994",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/182824.182842",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:53 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Hayes:1994:UDB,
  author =       "I. J. Hayes and C. B. Jones and J. E. Nicholls",
  title =        "Understanding the differences between {VDM} and Z",
  journal =      j-SIGSOFT,
  volume =       "19",
  number =       "3",
  pages =        "75--81",
  month =        jul,
  year =         "1994",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/182824.182843",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:53 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This paper attempts to provide an understanding of the
                 interesting differences between two well-known
                 specification languages.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Rolling:1994:PAB,
  author =       "Walter A. Rolling",
  title =        "A preliminary annotated bibliography on domain
                 engineering",
  journal =      j-SIGSOFT,
  volume =       "19",
  number =       "3",
  pages =        "82--84",
  month =        jul,
  year =         "1994",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/182824.182844",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:53 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Pfleeger:1994:DAS,
  author =       "Shari Lawrence Pfleeger",
  title =        "Design and analysis in software engineering: the
                 language of case studies and formal experiments",
  journal =      j-SIGSOFT,
  volume =       "19",
  number =       "4",
  pages =        "16--20",
  month =        oct,
  year =         "1994",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/190679.190680",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:55 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Sitariman:1994:CBS,
  author =       "Marulli Sitariman and Bruce Weide",
  title =        "Component-based software using {RESOLVE}",
  journal =      j-SIGSOFT,
  volume =       "19",
  number =       "4",
  pages =        "21--22",
  month =        oct,
  year =         "1994",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/190679.199221",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:55 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
  remark =       "The first author may be correctable to ``Murali
                 Sitaraman''.",
}

@Article{Ogden:1994:PRF,
  author =       "William F. Ogden and Murali Sitaraman and Bruce W.
                 Weide and Stuart H. Zweben",
  title =        "Part I: the {RESOLVE} framework and discipline: a
                 research synopsis",
  journal =      j-SIGSOFT,
  volume =       "19",
  number =       "4",
  pages =        "23--28",
  month =        oct,
  year =         "1994",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/190679.190681",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:55 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Edwards:1994:PIS,
  author =       "Stephen H. Edwards and Wayne D. Heym and Timothy J.
                 Long and Murali Sitaraman and Bruce W. Weide",
  title =        "{Part II}: specifying components in {RESOLVE}",
  journal =      j-SIGSOFT,
  volume =       "19",
  number =       "4",
  pages =        "29--39",
  month =        oct,
  year =         "1994",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/190679.190682",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:55 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Bucci:1994:PII,
  author =       "Paolo Bucci and Joseph E. Hollingsworth and Joan Krone
                 and Bruce W. Weide",
  title =        "{Part III}: implementing components in {RESOLVE}",
  journal =      j-SIGSOFT,
  volume =       "19",
  number =       "4",
  pages =        "40--51",
  month =        oct,
  year =         "1994",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/190679.190683",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:55 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Hollingsworth:1994:PIR,
  author =       "Joseph E. Hollingsworth and Sethu Sreerama and Bruce
                 W. Weide and Sergey Zhupanov",
  title =        "{Part IV}: {RESOLVE} components in {Ada} and {C++}",
  journal =      j-SIGSOFT,
  volume =       "19",
  number =       "4",
  pages =        "52--63",
  month =        oct,
  year =         "1994",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/190679.190684",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:55 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/adabooks.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Edwards:1994:PVA,
  author =       "Stephen H. Edwards",
  title =        "Part V: annotated bibliography of {RESOLVE} research",
  journal =      j-SIGSOFT,
  volume =       "19",
  number =       "4",
  pages =        "64--67",
  month =        oct,
  year =         "1994",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/190679.190685",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:55 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Terry:1994:OTD,
  author =       "Allan Terry and Frederick Hayes-Roth and Lee Erman and
                 Norman Coleman and Mary Devito and George
                 Papanagopoulos and Barbara Hayes-Roth",
  title =        "Overview of {Teknowledge}'s domain-specific software
                 architecture program",
  journal =      j-SIGSOFT,
  volume =       "19",
  number =       "4",
  pages =        "68--76",
  month =        oct,
  year =         "1994",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/190679.190686",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:55 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "As part of the ARPA DSSA program, we are developing a
                 methodology and integrating a suite of supporting tools
                 to help specify, design, validate, package and deploy
                 distributed intelligent control and management (DICAM)
                 applications. Our domain of specialization is vehicle
                 management systems, and our near-term focus is on
                 advanced artillery systems. To attain higher levels of
                 performance and functionality while reducing the time
                 and cost required for development, we are recommending
                 a generic control architecture suitable for use as a
                 single intelligent agent or as multiple cooperating
                 agents. This reference architecture combines a
                 task-oriented domain controller with a meta-controller
                 that schedules activities within the domain controller.
                 The domain controller provides functions for
                 model-based situation assessment and planning, and
                 inter-controller communication. Typically, these
                 functions are performed by components taken from a
                 repository of reusable software. In tasks that are
                 simple, deterministic or time-stressed, the modules may
                 be complied into or replaced by conventional control
                 algorithms. In complex, distributed, cooperative,
                 non-deterministic or unstressed situations, these
                 modules will usually exploit knowledge-based reasoning
                 and deliberative control. To improve the controller
                 development process, we are combining many of the best
                 ideas from software engineering and knowledge
                 engineering in a software environment. This environment
                 includes a blackboard-like development workspace to
                 represent both the software under development and the
                 software development process itself. In this workspace,
                 controllers are realized by mapping requirements into
                 specializations of the reference architecture. The
                 workspace also provides mechanisms for triggering
                 applications of software tools, including
                 knowledge-based software design assistants. We are
                 currently in the third year of a five-year program. In
                 conjunction with our collaborators at ARDEC, we have
                 produced a schema for describing architectures which is
                 being used by ARDEC's community of contractors, by an
                 ARPA architecture specification project for the Joint
                 Task Force ATD, and by the Stanford Knowledge Systems
                 Laboratory. We have released the second major version
                 of our development environment, which is being used at
                 ARDEC and in support of this ARPA architecture
                 specification program. This version of the development
                 environment is focused on initial requirements,
                 architecture, and design. It provides both CASE-like
                 editing of architectures and textual browsing/editing
                 of repository descriptions expressed in the schema
                 mentioned above. In the remaining years of the program
                 we will be expanding the suite of tools and improving
                 the methodologies required to build intelligent,
                 distributed, hybrid controllers capable of spanning
                 multiple levels of organization and system hierarchy.
                 This technology holds considerable promise for
                 near-term value, and the associated methodology
                 provides a candidate approach for realizing the goals
                 of mega-programming practice in control software. In
                 assessing this prospect, we discuss some of the
                 remaining shortfalls in both methodology and tools that
                 require additional research and development.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Gelperin:1994:PIM,
  author =       "David Gelperin",
  title =        "The power of integrated methods",
  journal =      j-SIGSOFT,
  volume =       "19",
  number =       "4",
  pages =        "77--78",
  month =        oct,
  year =         "1994",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/190679.190687",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:55 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Improving software quality is easy. Just do three
                 things: (1) Insert fewer bugs, (2) Find them earlier,
                 and (3) Find more of them. Modern test and evaluation
                 methods are very effective at all three. What is even
                 more effective is to integrate these methods into a
                 modern T\&E process and to integrate this process with
                 acquisition and development methods into a software
                 engineering program. Integration multiplies the impact
                 of effective methods and is a major theme in modern
                 approaches. On most projects, developers are
                 responsible for testing as well as designing, and
                 coding the software components. For a new component or
                 change to an existing component, one person usually
                 carries out all software engineering tasks. This note
                 describes an activity sequence that is very effective
                 at both avoiding and detecting defects when a single
                 individual does all the software engineering. The order
                 as well as the specific tasks in this sequence is
                 important in maximizing effectiveness. Understanding
                 the principals behind this process will make it easy to
                 modify when more than one person is assigned to the
                 development of a sinle component.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Zelkowitz:1994:AMR,
  author =       "Marvin V. Zelkowitz",
  title =        "Algebra and models (and reality)",
  journal =      j-SIGSOFT,
  volume =       "19",
  number =       "4",
  pages =        "79--81",
  month =        oct,
  year =         "1994",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/190679.190688",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:55 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Billard:1994:QSG,
  author =       "Edward A. Billard and Alice E. Riedmiller",
  title =        "{Q-Sim}: a {GUI} for a queueing simulator using
                 {Tcl\slash Tk}",
  journal =      j-SIGSOFT,
  volume =       "19",
  number =       "4",
  pages =        "82--85",
  month =        oct,
  year =         "1994",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/190679.190689",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:55 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "A design and implementation are presented for a
                 graphical user interface to a batch queueing simulator,
                 illustrating the benefits of using a high-level script
                 language. Rapid development was made possible with the
                 use of Tcl/Tk scripts to implement the entire
                 interface. The script implements a dynamic display of
                 job and queue movement along with graphs of statistical
                 behaviors. A message system is used to control the
                 interaction between the human interface and the batch
                 simulator.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Jackson:1994:NMP,
  author =       "Daniel Jackson and Eugene J. Rollins",
  title =        "A new model of program dependences for reverse
                 engineering",
  journal =      j-SIGSOFT,
  volume =       "19",
  number =       "5",
  pages =        "2--10",
  month =        dec,
  year =         "1994",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/195274.195281",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:56 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "A dependence model for reverse engineering should
                 treat procedures in a modular fashion and should be
                 fine-grained, distinguishing dependences that are due
                 to different variables. The program dependence graph
                 (PDG) satisfies neither of these criteria. We present a
                 new form of dependence graph that satisfies both, while
                 retaining the advantages of the PDG: it is easy to
                 construct and allows program slicing to be implemented
                 as a simple graph traversal. We define 'chopping', a
                 generalization of slicing that can express most of its
                 variants, and show that, using our dependence graph, it
                 produces more accurate results than algorithms based
                 directly on the PDG.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Reps:1994:SS,
  author =       "Thomas Reps and Susan Horwitz and Mooly Sagiv and
                 Genevieve Rosay",
  title =        "Speeding up slicing",
  journal =      j-SIGSOFT,
  volume =       "19",
  number =       "5",
  pages =        "11--20",
  month =        dec,
  year =         "1994",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/195274.195287",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:56 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Program slicing is a fundamental operation for many
                 software engineering tools. Currently, the most
                 efficient algorithm for interprocedural slicing is one
                 that uses a program representation called the system
                 dependence graph. This paper defines a new algorithm
                 for slicing with system dependence graphs that is
                 asymptotically faster than the previous one. A
                 preliminary experimental study indicates that the new
                 algorithm is also significantly faster in practice,
                 providing roughly a 6-fold speedup on examples of 348
                 to 757 lines.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Mashayekhi:1994:CCA,
  author =       "Vahid Mashayekhi and Chris Feulner and John Riedl",
  title =        "{CAIS}: collaborative asynchronous inspection of
                 software",
  journal =      j-SIGSOFT,
  volume =       "19",
  number =       "5",
  pages =        "21--34",
  month =        dec,
  year =         "1994",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/195274.195290",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:56 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Many software engineering tasks have a synchronous
                 component that requires the participants to assemble
                 together at the same time and place. This approach is
                 expensive in terms of traveling, scheduling and human
                 resources. Existing computer tools mitigate these
                 constraints by adding structure to the meeting,
                 providing on-line document support, and distributing
                 the participants over geographic boundaries. The
                 constraint remains, however, that all participants
                 participate at the same time. We propose relaxing the
                 time constraint in software engineering tasks to
                 resolve issues non-concurrently, in effect reducing
                 (and in some cases eliminating) the need for the
                 synchronous meeting. We hypothesize that support for
                 asynchrony will enable software engineering teams to
                 work together as effectively in different times as in
                 same time. We have chosen software inspection as our
                 candidate software engineering task because it is
                 well-understood, highly-structured, and
                 widely-practiced. We have designed and developed a
                 Collaborative Asynchronous Inspection of Software
                 (CAIS) meeting prototype that supports the meeting part
                 of inspection. CAIS allows participants to effectively
                 ``meet'' even when separated by time zones and working
                 schedules. We have conducted a pilot study comparing
                 the manual and CAIS meetings and present our results
                 and lessons learned.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Cece:1994:DIL,
  author =       "G{\'e}rard C{\'e}c{\'e} and Alain Finkel and S.
                 Purushothaman Iyer",
  title =        "Duplication, insertion and lossiness errors in
                 unreliable communication channels",
  journal =      j-SIGSOFT,
  volume =       "19",
  number =       "5",
  pages =        "35--43",
  month =        dec,
  year =         "1994",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/195274.195292",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:56 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "We consider the problem of verifying correctness of
                 finite state machines that communicate with each other
                 over unbounded FIFO channels that are unreliable.
                 Various problems regarding verification of FIFO
                 channels that can lose messages have been considered by
                 Finkel [10], and by Abdulla and Johnson [1, 2]. We
                 consider, in this paper, other possible unreliable
                 behaviors of communication channels, viz. (a)
                 duplication and (b) insertion errors. Furthermore, we
                 also consider various combinations of duplication,
                 insertion and lossiness errors. Finite state machines
                 that communicate over unbounded FIFO buffers is a model
                 of computation that forms the backbone of ISO standard
                 protocol specification languages Estelle and SDL. While
                 an assumption of a perfect communication medium is
                 reasonable at the higher levels of the OSI protocol
                 stack, the lower levels have to deal with an unreliable
                 communication medium; hence our motivation for the
                 present work. The verification problems that are of
                 interest are reachability, unboundedness, deadlock, and
                 model-checking against CTL. All of these problems are
                 undecidable for machines communicating over reliable
                 unbounded FIFO channels. So, it is perhaps surprising
                 that some of these problems become decidable when
                 unreliable channels are modeled. The contributions of
                 this paper are: (a) An investigation of solutions to
                 these problems for machines with insertion errors,
                 duplication errors, or a combination of duplication,
                 insertion and lossiness errors, and (b) A comparison of
                 the relative expressive power of the various errors.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Abowd:1994:ISE,
  author =       "Gregory D. Abowd and Alan J. Dix",
  title =        "Integrating status and event phenomena in formal
                 specifications of interactive systems",
  journal =      j-SIGSOFT,
  volume =       "19",
  number =       "5",
  pages =        "44--52",
  month =        dec,
  year =         "1994",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/195274.195293",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:56 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "In this paper we investigate the appropriateness of
                 formal specification languages for the description of
                 user interface phenomena. Specifically, we are
                 concerned with the distinction between continuously
                 available information, which we call status, and
                 atomic, non-persistent information, which we call
                 events. We propose a hybrid model and notation to
                 address status and event phenomena symmetrically. We
                 demonstrate the effectiveness of this model for
                 designing and understanding mixed control interaction,
                 an especially important topic in the design of
                 multi-user systems.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Corbett:1994:TSC,
  author =       "James C. Corbett and George S. Avrunin",
  title =        "Towards scalable compositional analysis",
  journal =      j-SIGSOFT,
  volume =       "19",
  number =       "5",
  pages =        "53--61",
  month =        dec,
  year =         "1994",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/195274.195294",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:56 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Due to the state explosion problem, analysis of large
                 concurrent programs will undoubtedly require
                 compositional techniques. Existing compositional
                 techniques are based on the idea of replacing complex
                 subsystems with simpler processes with the same
                 interfaces to their environments, and using the simpler
                 processes to analyze the full system. Most algorithms
                 for proving equivalence between two processes, however,
                 require enumerating the states of both processes. When
                 part of a concurrent system consists of many highly
                 coupled processes, it may not be possible to decompose
                 the system into components that are both small enough
                 to enumerate and have simple interfaces with their
                 environments. In such cases, analysis of the systems by
                 standard methods will be infeasible. In this paper, we
                 describe a technique for proving trace equivalence of
                 deterministic and divergence-free systems without
                 enumerating their states. (For deterministic systems,
                 essentially all the standard notions of process
                 equivalence collapse to trace equivalence, so this
                 technique also establishes failures equivalence,
                 observational equivalence, etc.) Our approach is to
                 generate necessary conditions for the existence of a
                 trace of one system that is not a trace of the other;
                 if the necessary conditions cannot be satisfied the
                 systems are equivalent. We have implemented the
                 technique and used it to establish the equivalence of
                 some systems with state spaces too large for
                 enumeration to be practical.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Dwyer:1994:DFA,
  author =       "Matthew B. Dwyer and Lori A. Clarke",
  title =        "Data flow analysis for verifying properties of
                 concurrent programs",
  journal =      j-SIGSOFT,
  volume =       "19",
  number =       "5",
  pages =        "62--75",
  month =        dec,
  year =         "1994",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/195274.195295",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:56 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "In this paper we present an approach, based on data
                 flow analysis, that can provide cost-effective analysis
                 of concurrent programs with respect to explicitly
                 stated correctness properties. Using this approach, a
                 developer specifies a property of a concurrent program
                 as a pattern of selected program events and asks the
                 analysis to verify that all or no program executions
                 satisfy the given property. We have developed a family
                 of polynomial-time, conservative data flow anlysis
                 algorithms that support reasoning about these
                 questions. To overcome the traditional inaccuracies of
                 static analysis, we have also developed a range of
                 techniques for improving the accuracy of the analysis
                 results. One strength of our approach is the
                 flexibility allowed in choosing and combining these
                 techniques so as to increase accuracy without making
                 analysis time impractical. We have implemented a
                 prototype toolset that automates the analysis for
                 programs with explicit tasking and rendezvous style
                 communication. We present preliminary experimental
                 results using this toolset.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Levy:1994:LIA,
  author =       "N. L{\'e}vy and G. Smith",
  title =        "A language-independent approach to specification
                 construction",
  journal =      j-SIGSOFT,
  volume =       "19",
  number =       "5",
  pages =        "76--86",
  month =        dec,
  year =         "1994",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/195274.195296",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:56 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "An interactive specification development environment
                 is presented in which a number of development
                 methodologies and specification languages can be
                 supported. Within the environment, design concepts and
                 strategies are captured by the application of
                 development operators, i.e. operators which enable the
                 incremental construction and modification of
                 specifications. The focus of this paper is to
                 investigate the language independence feature of the
                 environment, based on the work done in the Esprit
                 project ICARUS. A set of operators enabling an
                 object-oriented approach to specification development
                 are instantiated for both the algebraic specification
                 language Glider and the model-based specification
                 language Z. These operators are illustrated by the
                 development of a case study of a simple card game in
                 both Glider and Z.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Evans:1994:LTU,
  author =       "David Evans and John Guttag and James Horning and Yang
                 Meng Tan",
  title =        "{LCLint}: a tool for using specifications to check
                 code",
  journal =      j-SIGSOFT,
  volume =       "19",
  number =       "5",
  pages =        "87--96",
  month =        dec,
  year =         "1994",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/195274.195297",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:56 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This paper describes LCLint, an efficient and flexible
                 tool that accepts as input programs (written in ANSI C)
                 and various levels of formal specification. Using this
                 information, LCLint reports inconsistencies between a
                 program and its specification. We also describe our
                 experience using LCLint to help understand, document,
                 and re-engineer legacy code.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Bowdidge:1994:ASE,
  author =       "Robert W. Bowdidge and William G. Griswold",
  title =        "Automated support for encapsulating abstract data
                 types",
  journal =      j-SIGSOFT,
  volume =       "19",
  number =       "5",
  pages =        "97--110",
  month =        dec,
  year =         "1994",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/195274.195298",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:56 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "A software engineer can use a meaning-preserving
                 program restructuring tool during maintenance to change
                 a program's structure to ease modification. One common
                 restructuring action is to create a new abstract data
                 type by encapsulating an existing data structure. Data
                 encapsulation simplifies modification by isolating
                 changes to the implementation and behavior of an
                 abstract data type. To perform encapsulation, a
                 programmer must understand how the data structure is
                 used in the code, identify abstract operations
                 performed on the data structure, and choose concrete
                 expressions to be made into functions. We provide a
                 manipulable program visualization, called the star
                 diagram, that both highlights information pertinent to
                 encapsulation and supports the application of
                 meaning-preserving restructuring transformations on the
                 program through a direct-manipulation user interface.
                 The visualization graphically and compactly presents
                 all statements in the program that use the given global
                 data structure, helping the programmer to choose the
                 functions that completely encapsulate it. Additionally,
                 the visualization elides code unrelated to the data
                 structure and to the task, and collapses similar
                 expressions to allow the programmer to identify
                 frequently occurring code fragments and manipulate them
                 together. The visualization is mapped directly to the
                 program text, so manipulation of the visualization also
                 restructures the program. We describe the design,
                 implementation, and application of the star diagram,
                 and evaluate its ability to assist data encapsulation
                 in large programs.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Batory:1994:RCA,
  author =       "Don Batory and Jeff Thomas and Marty Sirkin",
  title =        "Reengineering a complex application using a scalable
                 data structure compiler",
  journal =      j-SIGSOFT,
  volume =       "19",
  number =       "5",
  pages =        "111--120",
  month =        dec,
  year =         "1994",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/195274.195299",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:56 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "P2 is a scalable compiler for collection data
                 structures. High-level abstractions insulate P2 users
                 from data structure implementation details. By
                 specifying a target data structure as a composition of
                 components from a reuse library, the P2 compiler
                 replaces abstract operations with their concrete
                 implementations.LEAPS is a production system compiler
                 that produces the fastest sequential executables of
                 OPS5 rule sets. LEAPS is a hand-written, highly-tuned,
                 performance-driven application that relies on complex
                 data structures. Reengineering LEAPS using P2 was an
                 acid test to evaluate P2's scalability, productivity
                 benefits, and generated code performance. In this
                 paper, we present some of our experimental results and
                 experience in this reengineering exercise. We show that
                 P2 scaled to this complex application, substantially
                 increased productivity, and provided unexpected
                 performance gains.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Vandevoorde:1994:USP,
  author =       "Mark T. Vandevoorde and John V. Guttag",
  title =        "Using specialized procedures and specification-based
                 analysis to reduce the runtime costs of modularity",
  journal =      j-SIGSOFT,
  volume =       "19",
  number =       "5",
  pages =        "121--127",
  month =        dec,
  year =         "1994",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/195274.195300",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:56 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Managing tradeoffs between program structure and
                 program efficiency is one of the most difficult
                 problems facing software engineers. Decomposing
                 programs into abstractions simplifies the construction
                 and maintenance of software and results in fewer
                 errors. However, the introduction of these abstractions
                 often introduces significant inefficiencies. This paper
                 describes a strategy for eliminating many of these
                 inefficiencies. It is based upon providing alternative
                 implementations of the same abstraction, and using
                 information contained in formal specifications to allow
                 a compiler to choose the appropriate one. The strategy
                 has been implemented in a prototype compiler that
                 incorporates theorem proving technology.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Hamlet:1994:FST,
  author =       "Dick Hamlet",
  title =        "Foundations of software testing: dependability
                 theory",
  journal =      j-SIGSOFT,
  volume =       "19",
  number =       "5",
  pages =        "128--139",
  month =        dec,
  year =         "1994",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/195274.195400",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:56 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Testing is potentially the best grounded part of
                 software engineering, since it deals with the well
                 defined situation of a fixed program and a test (a
                 finite collection of input values). However, the
                 fundamental theory of program testing is in disarray.
                 Part of the reason is a confusion of the goals of
                 testing --- what makes a test (or testing method)
                 ``good.'' I argue that testing's primary goal should be
                 to measure the dependability of tested software. In
                 support of this goal, a plausible theory of
                 dependability is needed to suggest and prove results
                 about what test methods should be used, and under what
                 circumstances. Although the outlines of dependability
                 theory are not yet clear, it is possible to identify
                 some of the fundamental questions and problems that
                 must be attacked, and to suggest promising approaches
                 and research methods. Perhaps the hardest step in this
                 research is admitting that we do not already have the
                 answers.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Dillon:1994:OCT,
  author =       "Laura K. Dillon and Qing Yu",
  title =        "Oracles for checking temporal properties of concurrent
                 systems",
  journal =      j-SIGSOFT,
  volume =       "19",
  number =       "5",
  pages =        "140--153",
  month =        dec,
  year =         "1994",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/195274.195401",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:56 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Verifying that test executions are correct is a
                 crucial step in the testing process. Unfortunately, it
                 can be a very arduous and error-prone step, especially
                 when testing a concurrent system. System developers can
                 therefore benefit from oracles automating the
                 verification of test executions. This paper examines
                 the use of Graphical Interval Logic (GIL) for
                 specifying temporal properties of concurrent systems
                 and describes a method for constructing oracles from
                 GIL specifications. The visually intuitive
                 representation of GIL specifications makes them easier
                 to develop and to understand than specifications
                 written in more traditional temporal logics.
                 Additionally, when a test execution violates a GIL
                 specification, the associated oracle provides
                 information about a fault. This information can be
                 displayed visually, together with the execution, to
                 help the system developer see where in the execution a
                 fault was detected and the nature of the fault.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Harrold:1994:PDF,
  author =       "Mary Jean Harrold and Gregg Rothermel",
  title =        "Performing data flow testing on classes",
  journal =      j-SIGSOFT,
  volume =       "19",
  number =       "5",
  pages =        "154--163",
  month =        dec,
  year =         "1994",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/195274.195402",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:56 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The basic unit of testing in an object-oriented
                 program is a class. Although there has been much recent
                 research on testing of classes, most of this work has
                 focused on black-box approaches. However, since
                 black-box testing techniques may not provide sufficient
                 code coverage, they should be augmented with code-based
                 or white-box techniques. Dataflow testing is a
                 code-based testing technique that uses the dataflow
                 relations in a program to guide the selection of tests.
                 Existing dataflow testing techniques can be applied
                 both to individual methods in a class and to methods in
                 a class that interact through messages, but these
                 techniques do not consider the dataflow interactions
                 that arise when users of a class invoke sequences of
                 methods in an arbitrary order. We present a new
                 approach to class testing that supports dataflow
                 testing for dataflow interactions in a class. For
                 individual methods in a class, and methods that send
                 messages to other methods in a the class, our technique
                 is similar to existing dataflow testing techniques. For
                 methods that are accessible outside the class, and can
                 be called in any order by users of the class, we
                 compute dataflow information, and use it to test
                 possible interactions between these methods. The main
                 benefit of our approach is that it facilitates dataflow
                 testing for an entire class. By supporting dataflow
                 testing of classes, we provide opportunities to find
                 errors in classes that may not be uncovered by
                 black-box testing. Our technique is also useful for
                 determining which sequences of methods should be
                 executed to test a class, even in the absence of a
                 specification. Finally, as with other code-based
                 testing techniques, a large portion of our technique
                 can be automated.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Moriconi:1994:CCS,
  author =       "Mark Moriconi and Xiaolei Qian",
  title =        "Correctness and composition of software
                 architectures",
  journal =      j-SIGSOFT,
  volume =       "19",
  number =       "5",
  pages =        "164--174",
  month =        dec,
  year =         "1994",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/195274.195403",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:56 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The design of a large system typically involves the
                 development of a hierarchy of different but related
                 architectures. A criterion for the relative correctness
                 of an architecture is presented, and conditions for
                 architecture composition are defined which ensure that
                 the correctness of a composite architecture follows
                 from the correctness of its parts. Both the criterion
                 and the composition requirements reflect special
                 considerations from the domain of software
                 architecture. The main points are illustrated by means
                 of familiar architecture for a compiler. A proof of the
                 relative correctness of two different compiler
                 architectures shows how to decompose a proof into
                 generic properties, which are proved once for every
                 pair of architectural styles, and instance-level
                 properties, which must be proved for every
                 architecture.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Garlan:1994:ESA,
  author =       "David Garlan and Robert Allen and John Ockerbloom",
  title =        "Exploiting style in architectural design
                 environments",
  journal =      j-SIGSOFT,
  volume =       "19",
  number =       "5",
  pages =        "175--188",
  month =        dec,
  year =         "1994",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/195274.195404",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:56 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "As the design of software architectures emerges as a
                 discipline within software engineering, it will become
                 increasingly important to support architectural
                 description and analysis with tools and environments.
                 In this paper we describe a system for developing
                 architectural design environments that exploit
                 architectural styles to guide software architects in
                 producing specific systems. The primary contributions
                 of this research are: (a) a generic object model for
                 representing architectural designs; (b) the
                 characterization of architectural styles as
                 specializations of this object model; and (c) a toolkit
                 for creating an open architectural design environment
                 from a description of a specific architectural style.
                 We use our experience in implementing these concepts to
                 illustrate how style-oriented architectural design
                 raises new challenges for software support
                 environments.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Howell:1995:SNSa,
  author =       "Chuck Howell",
  title =        "Surfing the net for {{\booktitle{Software Engineering
                 Notes}}}",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "1",
  pages =        "7--15",
  month =        jan,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/225907.225908",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Neumann:1995:RPCa,
  author =       "Peter G. Neumann",
  title =        "Risks to the public in computers and related systems",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "1",
  pages =        "16--21",
  month =        jan,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/225907.225909",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Pfleeger:1995:EDAa,
  author =       "Shari Lawrence Pfleeger",
  title =        "Experimental design and analysis in software
                 engineering:{Part 2}: how to set up and experiment",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "1",
  pages =        "22--26",
  month =        jan,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/225907.225910",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Shaw:1995:BOS,
  author =       "Mary Shaw",
  title =        "Beyond objects: a software design paradigm based on
                 process control",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "1",
  pages =        "27--38",
  month =        jan,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/225907.225911",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  note =         "See response \cite{Appelbe:1995:BOR}.",
  abstract =     "A standard demonstration problem in object-oriented
                 programming is the design of an automobile cruise
                 control. This design exercise demonstrates
                 object-oriented techniques well, but it does not ask
                 whether the object-oriented paradigm is the best one
                 for the task. Here we examine the alternative view that
                 cruise control is essentially a control problem. We
                 present a new software organization paradigm motivated
                 by process control loops. The control view leads us to
                 an architecture that is dominated by analysis of a
                 classical feedback loop rather than by the
                 identification of discrete stateful components to treat
                 as objects. The change in architectural model calls
                 attention to important questions about the cruise
                 control task that aren't addressed in an
                 object-oriented design.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Pohl:1995:WSF,
  author =       "Klaus Pohl and Gernot Starke and Peter Peters",
  title =        "Workshop summary: {First International Workshop on
                 Requirements Engineering: Foundation of Software
                 Quality (REFSQ;94)}",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "1",
  pages =        "39--45",
  month =        jan,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/225907.225912",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "As achieving high quality means the realization of
                 customers needs, requirements engineering (RE) is the
                 most crucial phase within software development. In the
                 RE process not only the functional requirements but
                 also the so-called 'non-functional' or 'quality'
                 requirements of the planned software system have to be
                 elicited from the customer and represented in a
                 requirements document in order to provide the software
                 designer a complete and correct specification.
                 Conventional RE methods usually support only parts of
                 this process or help stating only specific kinds of
                 requirements. These methodological problems were the
                 prime motivation for the REFSQ'94 workshop held in
                 conjunction with the CAiSE '94 Conference on Advanced
                 Information Systems Engineering in Utrecht, The
                 Netherlands on June 6th and 7th 1994. In order to find
                 solutions which handle the described deficiencies, it
                 was the goal of the workshop to improve the
                 understanding of the relations between both areas of
                 research in software engineering and not to give new
                 definitions of either requirements engineering or
                 software quality. On the Call for Papers addressing the
                 above problems we received 24 submissions. After the
                 reviewing process, we accepted 14 papers which have
                 high quality and cover the research areas related to
                 the workshop. Finally, 13 full and position papers were
                 presented at REFSQ '94 and discussed with the 23
                 participants (including the organizers) coming from
                 eleven different countries.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Song:1995:FUI,
  author =       "Xiping Song",
  title =        "A framework for understanding the integration of
                 design methodologies",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "1",
  pages =        "46--54",
  month =        jan,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/225907.225913",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Software researchers and practitioners have studied
                 and used a number of approaches to integrating major
                 design paradigms in order to improve Software Design
                 Methodologies (SDMs). Software tool developers have
                 developed tools to aid the integration and
                 customization of existing SDM support tools. However, a
                 framework for understanding and guiding various
                 integration and customization processes is still
                 lacking. Because of this users, even with tool support,
                 often fail to systematically integrate SDMs and SDM
                 support tools. In this paper, we define a framework
                 that can be used to understand various SDM integrations
                 and customizations. Through this definition, we
                 describe what kinds of integrations are useful, what
                 difficulties are to be met, and how the integrity of
                 the SDMs can be maintained.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Raccoon:1995:CMC,
  author =       "L. B. S. Raccoon",
  title =        "The chaos model and the chaos cycle",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "1",
  pages =        "55--66",
  month =        jan,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/225907.225914",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "I believe that to truly understand software
                 development, we must not only understand the flow of an
                 entire project and how to write each line of code, we
                 must also understand how one line of code relates to
                 the whole project. It seems to me that we have studied
                 each aspect of software development in isolation, not
                 how all aspects fit together. The Waterfall model,
                 defined by Royce, and the Spiral model, defined by
                 Boehm, discuss management-level issues, such as phases
                 and deadlines, rather than how to write one line of
                 code or fix one bug. Programming methodologies show us
                 how to solve technical problems, rather than how to
                 solve users' problems or to meet deadlines. In this
                 paper, I use the principles of chaos (or fractals) as a
                 metaphor to bridge the gap in our understanding of the
                 relationship between one line of code and the entire
                 project. Throughout this paper, I describe software
                 development from the developer's point of view. If we
                 want to understand software development, we must
                 describe what developers do. After all, developers do
                 the work. We know that large programs consist of many
                 lines of code and that large projects consist of the
                 daily efforts made by individual developers. We know
                 that the large scale and the small scale somehow relate
                 to each other. Yet most models of software development
                 seem to focus on one extreme or another, ignoring the
                 role of developers. In the first section, I define the
                 Chaos model which combines a simple, people-oriented,
                 problem-solving loop with fractals to describe the
                 structures within a project. I believe that software
                 development is a human activity: people write the
                 software, use the solutions, and experience the
                 problems. I believe that creating software is very
                 complex; we cannot simplify software development by
                 imposing simple models on it. The Chaos model uses
                 fractals to describe a cohesive structure which
                 encompasses many of the issues actually encountered
                 during software development. This structure helps to
                 explain the influences within a project and the roles
                 that developers play. In the second section, I
                 interpret the Chaos model to reveal the meaning behind
                 the structure. I show that users, developers, and
                 technologies form a continuum throughout software
                 development. They all interact in a complex dance. This
                 interpretation improves our understanding of the
                 contribution and limitations of users, developers, and
                 technologies. In the third section, I define the Chaos
                 life cycle to describe how a project evolves over time.
                 Life cycles are essentially the top-level perspectives
                 of software development. In light of the Chaos model, I
                 define the phases of the life cycle in terms of
                 fractals and show that all phases occur throughout the
                 life cycle. These chaotic definitions suggest that I
                 can interpret the complete life cycle in terms of each
                 phase, and conversely, I can interpret each phase in
                 terms of a complete life cycle. The phases of the life
                 cycle show our perspectives on the state of a project,
                 rather than what the state of a project really is.
                 Thus, developers need many skills to be able to
                 understand and respond to situations that arise
                 throughout a software development project.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Amoroso:1995:CFS,
  author =       "Edward G. Amoroso",
  title =        "Creating formal specifications from requirements
                 documents",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "1",
  pages =        "67--70",
  month =        jan,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/225907.225915",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "An approach is introduced for creating a model-based
                 formal specification from an informal requirements
                 document. The approach employs a structured
                 categorization and evolutionary refinement of informal
                 requirements to functional requirements, goals,
                 implementation demands, theorems, and axioms stated
                 with respect to a formal specification. The
                 evolutionary refinement terminates when the
                 specification and axioms can be expressed using
                 constructs in a target specification language. Guidance
                 is provided for integrating requirements changes,
                 existing automated support, and informal design
                 activities into the refinement. The approach is
                 demonstrated using informal requirements for an RS-232
                 repeater device.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Jorgensen:1995:QQB,
  author =       "Magne J{\o}rgensen",
  title =        "The quality of questionnaire based software
                 maintenance studies",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "1",
  pages =        "71--73",
  month =        jan,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/225907.225916",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Questionnaires sent to maintenance managers is a
                 frequently used approach to collect data on software
                 maintenance. This paper reports findings from two
                 studies, carried out at a large Norwegian maintenance
                 organisation, investigating the quality of
                 questionnaire based software maintenance studies.
                 Interesting findings were, among others, that:- The
                 definition of essential terms, for example of 'software
                 maintenance', at the beginning of a questionnaire did
                 not assure a consistent use of the terms by the
                 questionnaire respondents.- Manager estimates of the
                 proportion of effort spent on corrective maintenance
                 were biased when based on best guesses instead of good
                 data. For this reason, the frequently referred studies
                 of Lientz and Swanson (1980) and Nosek and Palvia
                 (1990) may have reported a too high proportion of
                 effort spent on corrective maintenance.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Viljamaa:1995:PBI,
  author =       "Panu Viljamaa",
  title =        "The patterns business: impressions from {PLoP-94}",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "1",
  pages =        "74--78",
  month =        jan,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/225907.225917",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Monticello --- Illinois was the place that hosted
                 PLoP-94 (The first Conference on Pattern Languages of
                 Programs) 4th --- 6th August 1994. Here I'll summarize
                 the insights into the nature of 'Patterns' and 'Pattern
                 Languages' I gained. The intended reader works with
                 software development but is more generally anybody
                 trying to improve the quality of intellectual tasks.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Jazaa:1995:TBS,
  author =       "Adid Jazaa",
  title =        "Toward better software automation",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "1",
  pages =        "79--84",
  month =        jan,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/225907.225918",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This paper discusses the concept and advantages of
                 automating software activities. It also addresses
                 software production costs and the problems associated
                 with software development. A logic-based framework for
                 managing the complexity of software projects is
                 proposed. The main investigations and suggestions are
                 summarised.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Ambriola:1995:DVM,
  author =       "Vincenzo Ambriola and Giovanni A. Cignoni",
  title =        "A distributed virtual machine to support software
                 process",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "1",
  pages =        "85--89",
  month =        jan,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/225907.225919",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  abstract =     "The availability of new technologies increases, at
                 least potentially, the chance to support cooperative
                 work exploiting the many resources offered by computer
                 networks. This opportunity is impaired by the lack of
                 tools able to manage the large variety of network
                 resources at an adequate level of abstraction. This
                 lack is particularly felt in the implementation of
                 software process support environments. In this paper we
                 describe how, in Oikos, we realized the distributed
                 run-time support to process enactment. On the basis of
                 this experience, we claim the need of a homogeneous
                 framework that overcomes this limitation. We propose
                 oiXos, a virtual machine that abstracts a network of
                 Unix workstations, disk servers, and X Window
                 terminals. We introduce the notions of component, item,
                 and gibject. Upon these notions we build the
                 abstraction level given by the oiXos virtual machine.
                 We discuss the oiXos architecture that relies on a
                 collection of system components that manage the objects
                 of the oiXos machine.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Poulin:1995:BRO,
  author =       "Jeffrey S. Poulin",
  title =        "Book Reviews: {{\booktitle{Object Databases --- The
                 Essentials}} by Mary E. S. Loomis}",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "1",
  pages =        "90--91",
  month =        jan,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/225907.565600",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Kostecki:1995:BRO,
  author =       "John A. Kostecki",
  title =        "Book review: {{\booktitle{Object-Oriented Software
                 Metrics}} by Mark Lorenz and Jeff Kidd}",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "1",
  pages =        "91--93",
  month =        jan,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/225907.773556",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Neumann:1995:BRS,
  author =       "Peter G. Neumann",
  title =        "Book review: {{\booktitle{Software Creativity}} by
                 Robert L. Glass}",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "1",
  pages =        "93",
  month =        jan,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/225907.773557",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Tracz:1995:BRC,
  author =       "Will Tracz",
  title =        "Book review: {{\booktitle{Computer Related Risks}} by
                 Peter G. Neumann (ACM Press Books 1995)}",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "1",
  pages =        "93",
  month =        jan,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/225907.773559",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Tracz:1995:BRS,
  author =       "Will Tracz",
  title =        "Book review: {{\booktitle{Software Engineering
                 Standards and Specifications: an Annotated Index and
                 Directory}} by Stan Magee and Leanard L. Trip}",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "1",
  pages =        "93",
  month =        jan,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/225907.773558",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Neumann:1995:RPCb,
  author =       "Peter G. Neumann",
  title =        "Risks to the Public in Computers and Related Systems",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "2",
  pages =        "7--13",
  month =        apr,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/224155.565629",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:58 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Pfleeger:1995:EDAb,
  author =       "Shari Lawrence Pfleeger",
  title =        "Experimental Design and Analysis in Software
                 Engineering: Types of Experimental Design",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "2",
  pages =        "14--16",
  month =        apr,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/224155.565630",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:58 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Sejnowski:1995:RDS,
  author =       "Matt Sejnowski",
  title =        "Revolutionary {DCF} System to Replace {CMM}",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "2",
  pages =        "16--17",
  month =        apr,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/224155.565632",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:58 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Davis:1995:PPD,
  author =       "Margaret J. Davis",
  title =        "Process and Product: Dichotomy or Duality?",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "2",
  pages =        "17--18",
  month =        apr,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/224155.565634",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:58 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Vanooteghem:1995:MMA,
  author =       "Hubert Vanooteghem",
  title =        "The Maturity Movement and Acedia",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "2",
  pages =        "18--19",
  month =        apr,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/224155.565636",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:58 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Britchef:1995:FPF,
  author =       "Bob Britchef",
  title =        "A Few (Proposed) Fundamental Laws of Programming",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "2",
  pages =        "19--20",
  month =        apr,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/224155.565637",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:58 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Holloway:1995:SEE,
  author =       "C. Michael Holloway",
  title =        "Software Engineering and Epistemology",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "2",
  pages =        "20--21",
  month =        apr,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/224155.565638",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:58 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Tracz:1995:TIC,
  author =       "Will Tracz",
  title =        "Third International Conference on Software Reuse
                 Summary",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "2",
  pages =        "21--22",
  month =        apr,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/224155.565639",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:58 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Anderson:1995:BOC,
  author =       "Bruce Anderson",
  title =        "Building organizational competence in software
                 architecture: {OOPSLA'94 Workshop} report",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "2",
  pages =        "25--28",
  month =        apr,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/224155.565642",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:58 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Dubois:1995:GTT,
  author =       "E. Dubois and J. Hagelstein and A. van Lamsweerde and
                 F. Orejas and J. Souquieres and P. Wodon",
  title =        "A Guided Tour through the {ICARUS} Project",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "2",
  pages =        "28--33",
  month =        apr,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/224155.565643",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:58 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Krishnamurthy:1995:CWE,
  author =       "Balachander Krishnamurthy",
  title =        "{CSCW 94 Workshop to Explore Relationships between
                 Research in Computer Supported Cooperative Work and
                 Software Process}: Workshop Report",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "2",
  pages =        "34--35",
  month =        apr,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/224155.565647",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:58 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Agarwal:1995:PPA,
  author =       "Rakesh Agarwal and Patricia Lago",
  title =        "{PATHOS --- a} paradigmatic approach to high-level
                 object-oriented software development",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "2",
  pages =        "36--41",
  month =        apr,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/224155.224156",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:58 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The growing complexity of information systems and the
                 ensuring problems of their development, maintenance and
                 management have highlighted the inadequacy of formal
                 and informal methods for constructing such systems.
                 These problems manifest themselves in the computer
                 systems which are often unmanageable, unreliable,
                 inflexible and hence difficult to maintain. Users have
                 often demanded for reliable computer systems because
                 they realize that most failures are due to poor
                 specification, and design. This has resulted in the
                 emergence of a number of information systems
                 methodologies together with associated computerized
                 development environments in which the Object-Oriented
                 (OO) approach is one of the most recent.OO is often
                 used for promoting software development and its reuse.
                 Languages like Smalltalk reduce not only development
                 time but also the cost of maintenance, simplifying the
                 creation of new systems and the reuse of old ones.
                 Nevertheless OO is not a panacea i.e. efforts are to
                 put in for its proper use. Thus we consider OO as a
                 paradigm which provides a new image, a new way of
                 conceptualizing the development life cycle. By the help
                 of paradigms, software developers and users are
                 supported in apprehending the development life cycle
                 and means to organize the aspects of the life cycle
                 into a comprehensive method.PATHOS (A Paradigmatic
                 Approach To High-level Object-Oriented Software
                 development) aims to demonstrate an approach to
                 information system development that will lead not only
                 to good information system creation, but also to
                 explicitly represent the maintenance of the business
                 knowledge so as to allow for its more effective and
                 active exploitation at run time.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Mannion:1995:SR,
  author =       "Mike Mannion and Barry Keepence",
  title =        "{SMART} requirements",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "2",
  pages =        "42--47",
  month =        apr,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/224155.224157",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:58 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Systems Analysis, or as it is increasingly known as
                 today, Requirements Engineering, is a time consuming,
                 expensive but critical phase in software (and system)
                 development. The ``perfect'' Requirements Specification
                 should exhibit a number of qualities including
                 correctness, completeness and consistency. Within a
                 Requirements Specification individual requirements at
                 the microscopic level should be justified, clear,
                 unambiguous and verifiable. However, in many cases
                 Systems Analysts or Requirements Engineers describe
                 requirements which fall short of these demands. In
                 addition, outside reviewers faced with presenting an
                 independent qualitative assessment of a Requirements
                 Specification have few guidelines to assist them. In
                 this paper we present a simple technique, borrowed from
                 objective setting in Management Psychology, to assist
                 the construction and evaluation of individual
                 requirements.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Jing:1995:MHL,
  author =       "Ying Jing and He Zhijun and Wu Zhaohui and Li Jiangyun
                 and Fan Weicheng and Xu Zhaohui",
  title =        "A methodology for high-level software specification
                 construction",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "2",
  pages =        "48--54",
  month =        apr,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/224155.224158",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:58 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This paper puts forward a kind of novel methodology
                 for software system development, from the point of view
                 of the problem existed in software development --- the
                 gap between the requirement specification level and the
                 program implementation level. We attempt to begin from
                 the specification level of software development to
                 touch the process of high-level specification
                 construction profoundly. We propose a specification
                 language to support multiple semantic dimensions and
                 based on which build a unified functional model of
                 software system in a specific domain. On the bases of
                 these, we apply transformation and refinement methods
                 to the model and transit it from the specification
                 level to the implementation level. We expect such a
                 process can change the current software producing
                 procedure in nature. We also put this methodology into
                 the application of the software development in
                 real-time serving domain we focus on, which turns out
                 to be encouraging.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Zelkowitz:1995:AMR,
  author =       "Marvin V. Zelkowitz",
  title =        "Algebra and models (and reality)",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "2",
  pages =        "55--57",
  month =        apr,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/224155.224159",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:58 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Ryant:1995:CAS,
  author =       "Ivan Ryant",
  title =        "The correctly analyzed system which behaves
                 incorrectly",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "2",
  pages =        "58--61",
  month =        apr,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/224155.224161",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:58 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Many systems analysts believe that strictly following
                 a methodology prevents them from producing incorrect
                 system specification. In fact, banking systems,
                 telephone exchanges and other information and control
                 systems may fail in any moment because of hidden
                 errors. This article explains that the most widespread
                 methodologies nowadays aid rising of dangerous
                 synchronization errors in the specification. What's the
                 matter? The methodologies isolate interacting
                 concurrent processes one from other. In order to
                 analyze concurrent behavior, we need to consider
                 interactions as a whole. We must not split interactions
                 into separate processes. Systems analysis aims to
                 specify information systems. There are several
                 approaches to the systems analysis. The two main
                 streams today are structured and object oriented
                 analysis. Unfortunately, both of them hide the danger
                 of incorrect synchronization without giving the analyst
                 any chance to control it. Perhaps, the most delusive
                 case of incorrect synchronization are time ---
                 dependent errors. Concurrent system is the system of
                 concurrent (sequential) processes that may interact
                 (communicate or synchronize each other).",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Arnold:1995:CIB,
  author =       "John E. Arnold",
  title =        "Control integration: a briefly annotated
                 bibliography",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "2",
  pages =        "62--67",
  month =        apr,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/224155.224162",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:58 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Churcher:1995:TCF,
  author =       "Neville I. Churcher and Martin J. Shepperd",
  title =        "Towards a conceptual framework for object oriented
                 software metrics",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "2",
  pages =        "69--75",
  month =        apr,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/224155.224163",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:58 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The development of software metrics for object
                 oriented (OO) languages is receiving increasing
                 attention. We examine the reasons why this is a much
                 more challenging problem than for conventional
                 languages. It seems premature to develop and apply OO
                 metrics while there remains uncertainty not only about
                 the precise definitions of many fundamental quantities
                 and their subsequent impact on derived metrics, but
                 also a lack of qualitative understanding of the
                 structure and behaviour of OO systems. We argue that
                 establishing a standard terminology and data model will
                 help provide a framework for both theoretical and
                 empirical work and increase the chances of early
                 success. One potential benefit is improvement of the
                 ability to perform independent validation of models and
                 metrics. We propose a data model and terminology and
                 illustrate the importance of such definitions by
                 examining the seemingly straightforward concept of the
                 number of methods per class. We discuss the
                 implications of ambiguities in definitions for a suite
                 of metrics which has recently been proposed.
                 Preliminary results from our analysis of industrial
                 systems are presented.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Whittle:1995:MLC,
  author =       "Ben Whittle",
  title =        "Models and languages for component description and
                 reuse",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "2",
  pages =        "76--89",
  month =        apr,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/224155.224165",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:12:58 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This paper brings together the current research on
                 reusable component models and component description
                 languages for reuse. The paper contains a description
                 and comparison of the 3C and REBOOT component models.
                 The importance and further development of the 3C model
                 is discussed. The component description language field
                 is surveyed, and an introduction is given to the
                 languages LIL, ACT TWO, $ \Pi $, Meld, CDL, CIDER,
                 LILEANNA, and RESOLVE. All of these languages are aimed
                 at describing reusable components in the design stages
                 of development. Criteria for examining component
                 description languages are introduced and used as the
                 basis of a comparison of the languages. The paper
                 concludes with suggestions for the convergence of these
                 developments, and suggestions for further work in this
                 field.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Howell:1995:SNSb,
  author =       "Chuck Howell",
  title =        "Surfing the net for {{\booktitle{Software Engineering
                 Notes}}}",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "3",
  pages =        "2--7",
  month =        jul,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/219308.773573",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:00 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Neumann:1995:RPCc,
  author =       "Peter G. Neumann",
  title =        "Risks to the Public in Computers and Related Systems",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "3",
  pages =        "7--12",
  month =        jul,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/219308.773574",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:00 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Pfleeger:1995:EDAc,
  author =       "Shari Lawrence Pfleeger",
  title =        "Experimental design and analysis in software
                 engineering, part 4: choosing an experimental design",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "3",
  pages =        "13--15",
  month =        jul,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/219308.219311",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:00 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Tracz:1995:ICS,
  author =       "Will Tracz",
  title =        "17th International Conference on Software Engineering:
                 Window on the World",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "3",
  pages =        "16--28",
  month =        jul,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/219308.773575",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:00 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Parnas:1995:IMI,
  author =       "David Lorge Parnas",
  title =        "On {ICSE}'s ``most influential'' papers",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "3",
  pages =        "29--32",
  month =        jul,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/219308.219312",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:00 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The International Conference on Software Engineering
                 has established a tradition of looking back 10
                 conferences and selecting papers that have stood the
                 test of time. The remarks below were prepared in
                 connection an acceptance speech at ICSE 17 where two
                 colleagues and I received the award for the best paper
                 of ICSE 7.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Humphrey:1995:WSY,
  author =       "Watts S. Humphrey",
  title =        "Why should you use a personal software process?",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "3",
  pages =        "33--36",
  month =        jul,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/219308.219313",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:00 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The Personal Software Process (PSP) is a structured
                 set of forms, standards, and procedures that is
                 designed to help you do better work. Data on the PSP's
                 early use shows that engineers achieve average
                 reductions of 75\% in numbers of injected defects, make
                 more accurate plans, and have higher productivity. To
                 date, the PSP has been used to write more than 1000
                 small programs with a total of over 100,000 LOC. C is
                 the language most commonly used but C++, Ada, Pascal,
                 FORTRAN, and Visual Basic have also been used. This
                 note describes the PSP, why it was developed, and how
                 it can help you to be a better software engineer.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Raccoon:1995:CG,
  author =       "L. B. S. Raccoon",
  title =        "The complexity gap",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "3",
  pages =        "37--44",
  month =        jul,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/219308.219315",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:00 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The Complexity Gap defines a new way to think about
                 software development. We have all heard that developers
                 need to be more productive and to work harder. But what
                 does this mean exactly? The Complexity Gap defines a
                 structure in which to explore concepts of process and
                 productivity and to show how these concepts relate to
                 conventional software development issues of tools and
                 training. Software development is complex. This paper
                 expands on the principles of the Chaos model that
                 suggest that the top-level user requirements and
                 bottom-level hacking are connected through many
                 intermediate levels, and that every level of software
                 development affects quality and productivity to the
                 same degree. In The Chaos Model and the Chaos Life
                 Cycle, I make these points. To clarify the
                 possibilities and limitations of software development,
                 I compare software development to assembly-line work.
                 In the software engineering community, we compare
                 software development to assembly lines for a variety of
                 reasons. Some managers want to acquire the same sense
                 of control over software development as factory
                 managers have over assembly lines. Other managers want
                 to apply assembly-line techniques, such as Statistical
                 Quality Control, to software development. I use both
                 the definition of the Complexity Gap and the
                 assembly-line analogy to suggest ways to improve the
                 software development process.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Appelbe:1995:BOR,
  author =       "Bill Appelbe and Gregory Abowd",
  title =        "Beyond objects: a response",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "3",
  pages =        "45--48",
  month =        jul,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/219308.219316",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:00 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  note =         "See \cite{Shaw:1995:BOS}.",
  abstract =     "In a recent article [5], Shaw puts forth the argument
                 that a process control paradigm for structuring
                 software is more natural, and hence most appropriate
                 for process control applications. However, we believe
                 that there are other considerations, such as
                 scalability and maintainability, that need to be
                 addressed when choosing a design paradigm. Our
                 experience, and a re-examination of Shaw's models,
                 suggests that object modeling is more appropriate for
                 large scale process control applications.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Tracz:1995:DDS,
  author =       "Will Tracz",
  title =        "{DSSA} (Domain-Specific Software Architecture):
                 pedagogical example",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "3",
  pages =        "49--62",
  month =        jul,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/219308.219318",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:00 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "A Domain-Specific Software Architecture (DSSA) has
                 been defined as: * ``an assemblage of software
                 components, specialized for a particular type of task
                 (domain), generalized for effective use across that
                 domain, composed in a standardized structure (topology)
                 effective for building successful applications''
                 [Hay94] or, alternately * a context for patterns of
                 problem elements, solution elements, and situations
                 that define mappings between them'' [Hid90]. The
                 following small example illustrates these definitions
                 as well as provides the reader with some insight into
                 the types of processes and tools needed to support the
                 creation and use of a DSSA.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Garlan:1995:SDW,
  author =       "David Garlan and Walter Tichy and Frances Paulisch",
  title =        "Summary of the {Dagstuhl Workshop on Software
                 Architecture}",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "3",
  pages =        "63--83",
  month =        jul,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/219308.219320",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:00 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Garlan:1995:FIW,
  author =       "David Garlan",
  title =        "{First International Workshop on Architectures for
                 Software Systems} workshop summary",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "3",
  pages =        "84--89",
  month =        jul,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/219308.219322",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:00 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "As systems become more complex, the high-level
                 organization of the overall system --- the software
                 architecture --- becomes a critical aspect of design.
                 Architectural concerns include organization of a system
                 as a composition of components; global control
                 structures; protocols for communication,
                 synchronization, and data access; assignment of
                 functionality to design elements; physical
                 distribution; scaling and performance; dimensions of
                 evolution; and selection among design alternatives.
                 Recently, software architecture has begun to emerge as
                 an important field of study for software engineering
                 practitioners and researchers. Architectural issues are
                 being addressed by work in areas such as module
                 interface languages, domain-specific architectures,
                 software reuse, codification of organizational patterns
                 for software, architectural description languages,
                 formal underpinnings for architectural design, and
                 architectural design environments. While there has been
                 considerable recent activity in this area, much of it
                 has gone on in small groups and many of these efforts
                 are operating without detailed knowledge of other
                 on-going work. This workshop brought together
                 researchers and practitioners interested in software
                 architecture to discuss the current state of the
                 practice and art. The primary goal was to establish a
                 common understanding of the state of the practice, the
                 kinds of research and development efforts that are in
                 progress, and the important challenges for this
                 emerging field. The response to the call for papers for
                 this workshop provides convincing evidence of the
                 increasing interest and importance of software
                 architecture. There were 86 papers submitted, involving
                 over 140 authors. Of these, 32 were chosen for
                 inclusion in the workshop. These papers were
                 distributed to the participants in the form of a
                 workshop proceedings. The proceedings has recently been
                 reissued as a Carnegie Mellon Technical report,
                 ``Proceedings of the First International Workshop on
                 Software Architecture'', CMU-CS-TR-95-151. Copies may
                 be obtained from CS Documentation, School of Computer
                 Science, Carnegie Mellon University, 5000 Forbes Ave.,
                 Pittsburgh, PA 15213-3891 (tel: 412-268-2596, email:
                 [email protected]). The workshop organizing committee
                 consisted of David Garlan, Workshop Chair (Carnegie
                 Mellon University), Bob Balzer (USC Information
                 Sciences Institute), Barry Boehm (University of
                 Southern California), Martin Griss (Hewlett Packard
                 Laboratories), Jeffrey Kramer (Imperial College), Doug
                 Lea (SUNY Oswego \& NY CASE Center), Dewayne Perry
                 (AT\&T Bell Labs), Mary Shaw (Carnegie Mellon
                 University), Will Tracz (Loral Federal Systems), and
                 Alexander Wolf (University of Colorado at Boulder).",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Maiden:1995:ROR,
  author =       "N. A. M. Maiden",
  title =        "Reuse-oriented requirements engineering in {NATURE}",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "3",
  pages =        "90--93",
  month =        jul,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/219308.219324",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:00 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This short paper outlines research undertaken as part
                 of the ESPRIT III NATURE basic research action into
                 domain-specific requirements engineering environments.
                 It describes a set of problem abstractions which are
                 the basis for intelligent guidance during requirements
                 scoping, acquisition, modeling, critiquing and
                 communication. It presents a toolkit designed to
                 exploit the problem abstractions during different
                 requirements engineering activities. Routes for
                 industrial exploitation of these research results are
                 also outlined.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Tatsuta:1995:PVR,
  author =       "Tanehiro Tatsuta",
  title =        "Practical verification for requirements model of
                 {Hatley\slash Pirbhai}",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "3",
  pages =        "94--97",
  month =        jul,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/219308.219325",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:00 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Five years have passed since translated version of a
                 popular book on Real Time Structured Analysis method
                 was published in Japan. Japanese readers of it have
                 been discussing its practical usage actively. Its
                 research work is however hardly ever presented abroad.
                 We will show here recent Japanese research work on
                 it.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Aho:1995:FIG,
  author =       "Alfred V. Aho and Nancy D. Griffeth",
  title =        "Feature interactions in the global information
                 infrastructure",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "4",
  pages =        "2--4",
  month =        oct,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/222132.222133",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:01 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Garlan:1995:SAP,
  author =       "David Garlan",
  title =        "Software architecture (panel): next steps towards an
                 engineering discipline for software systems design",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "4",
  pages =        "5",
  month =        oct,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/222132.222134",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:01 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Zaremski:1995:SMS,
  author =       "Amy Moormann Zaremski and Jeannette M. Wing",
  title =        "Specification matching of software components",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "4",
  pages =        "6--17",
  month =        oct,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/222132.222135",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:01 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Murphy:1995:SRM,
  author =       "Gail C. Murphy and David Notkin and Kevin Sullivan",
  title =        "Software reflexion models: bridging the gap between
                 source and high-level models",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "4",
  pages =        "18--28",
  month =        oct,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/222132.222136",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:01 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Gupta:1995:HSA,
  author =       "Rajiv Gupta and Mary Lou Soffa",
  title =        "Hybrid slicing: an approach for refining static slices
                 using dynamic information",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "4",
  pages =        "29--40",
  month =        oct,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/222132.222137",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:01 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Reps:1995:PIC,
  author =       "Thomas Reps and Genevieve Rosay",
  title =        "Precise interprocedural chopping",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "4",
  pages =        "41--52",
  month =        oct,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/222132.222138",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:01 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Hoffman:1995:SAM,
  author =       "Daniel Hoffman and Paul Strooper",
  title =        "State abstraction and modular software development",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "4",
  pages =        "53--61",
  month =        oct,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/222132.222139",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:01 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Fekete:1995:LCM,
  author =       "Alan Fekete",
  title =        "Liveness conditions in model-based service
                 specifications: a case study",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "4",
  pages =        "62--71",
  month =        oct,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/222132.222140",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:01 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Fiadeiro:1995:IFS,
  author =       "Jos{\'e} Luiz Fiadeiro and Tom Maibaum",
  title =        "Interconnecting formalisms: supporting modularity,
                 reuse and incrementality",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "4",
  pages =        "72--80",
  month =        oct,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/222132.222141",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:01 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Weyuker:1995:UCF,
  author =       "Elaine J. Weyuker",
  title =        "Using the consequence of failures for testing and
                 reliability assessment",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "4",
  pages =        "81--91",
  month =        oct,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/222132.222143",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:01 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Porter:1995:EAC,
  author =       "A. Porter and H. Siy and C. A. Toman and L. G. Votta",
  title =        "An experiment to assess the cost-benefits of code
                 inspections in large scale software development",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "4",
  pages =        "92--103",
  month =        oct,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/222132.222144",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:01 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Horwitz:1995:DID,
  author =       "Susan Horwitz and Thomas Reps and Mooly Sagiv",
  title =        "Demand interprocedural dataflow analysis",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "4",
  pages =        "104--115",
  month =        oct,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/222132.222146",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:01 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Murphy:1995:LSM,
  author =       "Gail C. Murphy and David Notkin",
  title =        "Lightweight source model extraction",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "4",
  pages =        "116--127",
  month =        oct,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/222132.222147",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:01 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Wing:1995:MCS,
  author =       "Jeannette M. Wing and Mandana Vaziri-Farahani",
  title =        "Model checking software systems: a case study",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "4",
  pages =        "128--139",
  month =        oct,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/222132.222148",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:01 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Cheung:1995:CRA,
  author =       "S. C. Cheung and J. Kramer",
  title =        "Compositional reachability analysis of finite-state
                 distributed systems with user-specified constraints",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "4",
  pages =        "140--150",
  month =        oct,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/222132.222149",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:01 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Zeller:1995:UVM,
  author =       "Andreas Zeller",
  title =        "A unified version model for configuration management",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "4",
  pages =        "151--160",
  month =        oct,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/222132.222151",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:01 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Kaplan:1995:FAU,
  author =       "Alan Kaplan and Jack C. Wileden",
  title =        "Formalization and application of a unifying model for
                 name management",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "4",
  pages =        "161--172",
  month =        oct,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/222132.222152",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:01 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Neumann:1995:RPCd,
  author =       "Peter G. Neumann",
  title =        "Risks to the public in computers and related systems",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "5",
  pages =        "8--14",
  month =        dec,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/217030.217031",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:02 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Pfleeger:1995:EDAd,
  author =       "Shari Lawrence Pfleeger",
  title =        "Experimental design and analysis in software
                 engineering, part 5: analyzing the data",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "5",
  pages =        "14--17",
  month =        dec,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/217030.217032",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:02 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Boehm:1995:REN,
  author =       "Barry Boehm",
  title =        "Reuse emphasized at next process workshop",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "5",
  pages =        "17",
  month =        dec,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/217030.773572",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:02 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Salasin:1995:EDC,
  author =       "John Salasin and Howie Shrobe",
  title =        "Evolutionary design of complex software {(EDCS)}",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "5",
  pages =        "18--22",
  month =        dec,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/217030.217033",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:02 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This document is intended to provide background
                 information for offerers responding to BAA 95-40:
                 Evolutionary Design of Complex Software (EDCS). It
                 describes the general problem that the EDCS Program
                 addresses along with some of the characteristics of the
                 Program's organization. Then it discusses some concepts
                 for evolutionary systems and some of the technology
                 investigations that are felt to support those concepts.
                 This is presented for illustrative purposes only.
                 Offerors should not feel constrained to the particular
                 concepts of evolution articulated nor to the technology
                 areas and sample investigation projects delineated.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Cross:1995:SWC,
  author =       "James H. {Cross II} and Alex Quilici and Linda Wills
                 and Philip Newcomb and Elliot Chikofsky",
  title =        "Second working conference on reverse engineering
                 summary report",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "5",
  pages =        "23--26",
  month =        dec,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/217030.217619",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:02 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Taylor:1995:SDU,
  author =       "Richard N. Taylor and Will Tracz and Lou Coglianese",
  title =        "Software development using domain-specific software
                 architectures: {CDRl} A011 --- a curriculum module in
                 the {SEI} style",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "5",
  pages =        "27--38",
  month =        dec,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/217030.217034",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:02 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The objective of software development using
                 domain-specific software architectures (DSSA) is
                 reduction in time and cost of producing specific
                 application systems within a supported domain, along
                 with increased product quality, improved manageability,
                 and positioning for acquisition of future business. Key
                 aspects of the approach include software reuse based on
                 parameterization of generic components and
                 interconnection of components within a canonical
                 solution framework. Viability of the approach depends
                 on identification and deep understanding of a selected
                 domain of applications. The DSSA approach, to be
                 effectively applied, requires a variety of support
                 tools, including repository mechanisms, prototyping
                 facilities, and analysis tools. This curriculum module
                 describes the DSSA approach, representative examples,
                 supporting tools, and processes.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Kelsey:1995:PTM,
  author =       "Robert Bruce Kelsey",
  title =        "``{A} plea for tolerance in matters
                 epistemological{\ldots}''",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "5",
  pages =        "39",
  month =        dec,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/217030.217036",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:02 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Raccoon:1995:CS,
  author =       "L. B. S. Raccoon",
  title =        "The chaos strategy",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "5",
  pages =        "40--47",
  month =        dec,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/217030.217037",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:02 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "``What line of code should I write next?'' This paper
                 resulted from my search for an answer that reflects my
                 experiences in writing real programs, and reflects both
                 the Chaos model and life cycle. After trying to infer
                 an answer directly from the Chaos life cycle, in fact
                 from any life cycle, I ultimately gave up. I concluded
                 that while life cycles describe what I can do in a
                 project, life cycles do not describe what I should do
                 in a project. For that I need another concept, such as
                 strategy. Strategies are idealized plans of how
                 software development should work. Strategies help us to
                 prioritize the things we do. A general strategy defines
                 an overall approach for solving a problem that must be
                 adapted to meet local circumstances. A specific
                 strategy defines immediate goals. A good specific
                 strategy balances short-term progress with long-term
                 goals. Applying the concept of strategy to software
                 development may seem inappropriate, or even absurd, to
                 software developers who normally worry about concepts
                 like correctness, specification, and quality.
                 Developers have been taught to think of software
                 development as totally predictable, with each step a
                 perfectly understood element. Strategy implies a
                 contest which admits that a developer could lose. On
                 the other hand, developers may be more familiar
                 applying strategy to investments, marketing, elections,
                 and war. People do meaningfully use strategy for
                 complex military and business problems. In The Chaos
                 Model and the Chaos Life Cycle, I argued that each
                 software development project is a chaotic, multi-level
                 sequence of issues that arise and get resolved.
                 Developers repeatedly select an issue to resolve,
                 devise an approach, implement a solution, maintain the
                 resulting program, and so forth. Software development
                 is a project-to-project, situation-to-situation,
                 minute-to-minute process, with many levels. Developers
                 must deal with all levels from the ``whole project''
                 level down to the ``one line of code'' level. In The
                 Complexity Gap, I argued that the middle levels of a
                 project are not addressed by the traditional Stepwise
                 Refinement and Object-Oriented Design strategies. The
                 macro-process and top-down strategies address the top
                 levels of a project. The micro-process and bottom-up
                 strategies address the bottom levels of a project. In
                 this paper, I propose the Chaos strategy to guide
                 development on the levels of a project within the
                 Complexity Gap. I begin by describing parallels between
                 software development and games of strategy, and by
                 defining the Software Development Game. I then define
                 elements of the Chaos strategy, a middle-out,
                 technology-independent strategy. Finally, I show how to
                 adapt the Chaos strategy to fit the various
                 circumstances that arise in complex software
                 development projects.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Billard:1995:GML,
  author =       "Edward A. Billard and Alice E. Riedmiller",
  title =        "A {GUI} for a manager of lightweight processes",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "5",
  pages =        "48--50",
  month =        dec,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/217030.217038",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:02 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "A design is presented for a graphical user interface
                 to a manager of lightweight processes. The manager is
                 XINU-like in its support for semaphores, messages and
                 sleeping but is implemented with the lightweight
                 process library of UNIX. Each state change is piped to
                 a GUI written in Tcl/Tk. The display shows processes
                 waiting in queues and processes moving from state to
                 state (i.e. free, suspended, ready, current, waiting,
                 receiving, sleeping, writing, reading). The GUI has a
                 control panel that allows the user to watch and debug
                 user-written concurrent processes.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Philip:1995:RFS,
  author =       "Thomas Philip and Ramani Ramsundar",
  title =        "A reengineering framework for small scale software",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "5",
  pages =        "51--55",
  month =        dec,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/217030.217040",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:02 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Reengineering software is approached in different
                 ways, even though the basic process remains the same:
                 reverse engineering followed by forward engineering.
                 Tools are available to aid during reverse engineering
                 and reengineering. This paper presents a framework we
                 used to reengineer a small scale software system from a
                 partial structured implementation to an object-oriented
                 implementation. The framework uses function matrix to
                 organize the extracted abstractions, algorithm tables,
                 and data dictionary during its initial phase.
                 Components for the target system object model are
                 retrieved from the matrices and the dictionary. An
                 empirical reuse metric was applied to the matrix to
                 identify reusable parts. Application of this framework
                 is also discussed.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Aggarwal:1995:SRA,
  author =       "K. K. Aggarwal and Yogesh Singh",
  title =        "Software reliability apportionment using the analytic
                 hierarchy process",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "5",
  pages =        "56--61",
  month =        dec,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/217030.217041",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:02 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "In this paper, we present a software reliability
                 apportionment scheme using analytic hierarchy process
                 which attempts to answer the question ``how reliable
                 should each system module be?''. Reliability
                 requirements determined by integrating user's view,
                 software manager's view and programmer's view would be
                 more realistic, consistent and economically attainable
                 than those obtained through subjective or haphazard
                 method. This model determines reliability goals at the
                 planning and design stages of the software project,
                 hence making reliability a singular measure for
                 performance evaluation. The concept of frequency ratio
                 is used which considers the probability of a module
                 execution when the software is executed for a
                 predefined number of input cases. Modules which are to
                 be executed rather infrequently may be allocated
                 relatively lower reliability values.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Xu:1995:ISS,
  author =       "Dianxiang Xu and Guoliang Zheng",
  title =        "Inheritance as sublation and its semantics",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "5",
  pages =        "62--66",
  month =        dec,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/217030.217042",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:02 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This paper presents an approach to non-monotonic
                 inheritance in an object-oriented logic programming
                 framework. Inheritance as sublation, achieved through
                 predicate extension and exception, not only provides a
                 very flexible mechanism for software reuse but also is
                 very philosophical. Taking the (iterated least
                 fixpoint) well-founded model semantics to traditional
                 logic programs as a basis, the declarative semantics is
                 also explored.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Xu:1995:DJD,
  author =       "Manwu Xu and Fancong Zeng and Jianfeng Lu and Dong
                 Yang",
  title =        "The development of {JR}-{DSSG}: a case study of
                 software reuse",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "5",
  pages =        "67--72",
  month =        dec,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/217030.217043",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:02 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "To increase software productivity and enhance its
                 quality, techniques for software reuse have attracted
                 more and more attention in recent years. Among these
                 techniques, application generator is a rather practical
                 one but without deep explorations yet. In this paper,
                 at first we examine the application generator in terms
                 of characteristics of software reuse. And then, as a
                 case study of application generator technique, the
                 development of JR-DSSG and its features are presented.
                 Finally, we end this paper with a discussion of
                 intended further work.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Kogut:1995:DRC,
  author =       "Paul Kogut",
  title =        "Design reuse: chemical engineering vs. software
                 engineering",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "5",
  pages =        "73--77",
  month =        dec,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/217030.217044",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:02 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The evolution of software engineering to a mature
                 engineering discipline can be accelerated by adopting
                 practices from other mature engineering disciplines.
                 Mature engineering disciplines such as a chemical
                 engineering have extensive systematic design reuse
                 practices. In this paper, design reuse in chemical
                 engineering is compared to current and emerging design
                 reuse in software engineering. This comparison is based
                 on the analogy that a chemical process that is
                 implemented as a chemical plant is comparable to a
                 software architecture that is implemented as a software
                 system. The goal is to gain some insights on how
                 engineering models are used to support systematic
                 design reuse. These insights will help form the basis
                 of model based software engineering.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Leach:1995:IDA,
  author =       "Ronald J. Leach and Terrence L. Fuller",
  title =        "An illustration of the domain analysis process",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "5",
  pages =        "78--82",
  month =        dec,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/217030.217046",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:02 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/linux.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/unix.bib",
  abstract =     "Most researchers in software reuse believe that domain
                 analysis is a requirement for a successful reuse
                 program. Domain analysis is a generalization of systems
                 analysis, in which the primary objective is to identify
                 the operations and objects needed to specify
                 information processing in a particular application
                 domain. The ultimate purpose is to create
                 domain-specific languages that permit specifications to
                 be written in terms meaningful to the domain. The paper
                 discusses domain analysis of the Linux operating
                 system.",
  acknowledgement = ack-nhfb,
  affiliation =  "Dept. of Syst. and Comput. Sci., Howard Univ.,
                 Washington, DC, USA",
  classification = "C6110B (Software engineering techniques); C6150J
                 (Operating systems)",
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
  keywords =     "Domain analysis; Domain-specific languages;
                 Information processing; Linux; Operating system;
                 Software reuse; Specification; Systems analysis",
  thesaurus =    "Formal specification; Operating systems [computers];
                 Software reusability; Systems analysis",
}

@Article{Ozcan:1995:VRV,
  author =       "M. B. Ozcan and I. Morrey",
  title =        "A visual requirements validation environment for the
                 reverse engineering of formal specifications from rapid
                 prototypes",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "5",
  pages =        "83--87",
  month =        dec,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/217030.217047",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:02 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This paper describes a research project whose aim is
                 the use of requirements visualisation techniques in the
                 construction of an environment for the reverse
                 engineering of validated formal specifications from
                 rapid prototypes. The work will build on established
                 research by the proposers in the animation of
                 model-based and algebraic formal specifications. The
                 report examines the current problems with requirements
                 engineering and looks at solutions based on software
                 prototyping and executable formal specifications. It is
                 argued that prototypes built in this way can be too
                 ``formal'', in the sense that the customer viewing the
                 prototype cannot easily comprehend the results of
                 execution. For these types of prototypes to be useful,
                 the output must be transformed into a representation
                 which is more amenable for comprehension, namely
                 graphical visualisations and animation instead of
                 cryptic mathematical expressions. In this context, the
                 term ``animation'' normally refers to an executable
                 version of a formal specification which can be used to
                 demonstrate to the user that the specification is doing
                 what it should. In other words, the animation is a
                 program whose behaviour can be explored with a view to
                 confirming the user's expectations. Our aim is to
                 investigate techniques and a methodology for building
                 this program prior to the specification, based on some
                 initial informal requirements, and reverse engineering
                 a formal specification from it. The product of the
                 research programme will be a software environment to
                 support this requirements visualisation, animation and
                 reverse engineering approach.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Ayers:1995:BRC,
  author =       "Michael Ayers",
  title =        "Book Reviews: {{\booktitle{The Capability Maturity
                 Model Guidelines for Improving the Software
                 Process}}}",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "5",
  pages =        "88--89",
  month =        dec,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/217030.565652",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:02 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Borstler:1995:BRR,
  author =       "Jurgen Borstler",
  title =        "Book Review: {{\booktitle{Reengineering Information
                 Technology Success Through Empowerment}}}",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "5",
  pages =        "89",
  month =        dec,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/217030.565653",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:02 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Finkbine:1995:SI,
  author =       "Ronald B. Finkbine and Ph. D.",
  title =        "Software Inspection",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "5",
  pages =        "90",
  month =        dec,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/217030.565654",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:02 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Leisner:1995:CUP,
  author =       "Marry Leisner",
  title =        "Confessions of a Used Program Salesman:
                 Institutionalizing Software Reuse",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "5",
  pages =        "90",
  month =        dec,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/217030.565657",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:02 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Neumann:1995:SSS,
  author =       "Peter Neumann",
  title =        "Safeware: System Safety and Computers",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "5",
  pages =        "90--91",
  month =        dec,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/217030.565656",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:02 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Hansen:1995:SS,
  author =       "Brinch Hansen",
  title =        "The {SuperPascal} Software",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "5",
  pages =        "91",
  month =        dec,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/217030.565658",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:02 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Neumann:1995:FDC,
  author =       "Peter Neumann",
  title =        "Fatal Defect: Chasing Killer Computer Bugs",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "5",
  pages =        "91",
  month =        dec,
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/217030.565659",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:02 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Shaw:1995:AIS,
  author =       "Mary Shaw",
  title =        "Architectural issues in software reuse: it's not just
                 the functionality, it's the packaging",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "SI",
  pages =        "3--6",
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/223427.211783",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Effective reuse depends not only on finding and
                 reusing components, but also on the ways those
                 components are combined. The informal folklore of
                 software engineering provides a number of diverse
                 styles for organizing software systems. These styles,
                 or architectures, show how to compose systems from
                 components; different styles expect different kinds of
                 component packaging and different kinds of interactions
                 between the components. Unfortunately, these styles and
                 packaging distinctions are often implicit; as a
                 consequence, components with appropriate functionality
                 may fail to work together. This talk surveys common
                 architectural styles, including important packaging and
                 interaction distinctions, and proposes an approach to
                 the problem of reconciling architectural mismatches.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
  remark =       "SSR '95 Proceedings of the 1995 Symposium on Software
                 reusability.",
}

@Article{Prieto-Diaz:1995:SRS,
  author =       "Rub{\'e}n Prieto-D{\'\i}az",
  title =        "Systematic reuse: a scientific or an engineering
                 method?",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "SI",
  pages =        "9--10",
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/223427.211784",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
  remark =       "SSR '95 Proceedings of the 1995 Symposium on Software
                 reusability.",
}

@Article{Tracz:1995:CUP,
  author =       "Will Tracz",
  title =        "Confessions of a used-program salesman: lessons
                 learned",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "SI",
  pages =        "11--13",
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/223427.211785",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Software reuse is the second oldest programming
                 profession. Ever since the first program logic board
                 was wired, people have been looking for ways of saving
                 time and money by building upon other's efforts and not
                 ``not re-inventing any wheels.'' This article
                 summarizes the lessons I have learned as used-program
                 salesman. Using this analogy, I will examine efforts
                 made to institutionalize software reuse.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
  remark =       "SSR '95 Proceedings of the 1995 Symposium on Software
                 reusability.",
}

@Article{Griss:1995:SSR,
  author =       "Martin Griss and Ivar Jacobson and Chris Jette and Bob
                 Kessler and Doug Lea",
  title =        "Systematic software reuse (panel): objects and
                 frameworks are not enough",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "SI",
  pages =        "17--20",
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/223427.213969",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Ensuring that object technology will achieve its
                 promise of significant software reuse requires that
                 special attention be paid to a combination of people,
                 process and technology issues. Reuse will not happen
                 automatically. The panelists will describe their
                 experience with OO reuse and their views on the
                 issues.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
  remark =       "SSR '95 Proceedings of the 1995 Symposium on Software
                 reusability.",
}

@Article{Arango:1995:SRI,
  author =       "Guillermo Arango",
  title =        "Software reusability and the {Internet}",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "SI",
  pages =        "22--23",
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/223427.213970",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
  remark =       "SSR '95 Proceedings of the 1995 Symposium on Software
                 reusability.",
}

@Article{Batory:1995:CRA,
  author =       "Don Batory and Lou Coglianese and Mark Goodwin and
                 Steve Shafer",
  title =        "Creating reference architectures: an example from
                 avionics",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "SI",
  pages =        "27--37",
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/223427.211786",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "ADAGE is a project to define and build a
                 domain-specific software architecture (DSSA)
                 environment for assisting the development of avionics
                 software. A central concept of DSSA is the use of
                 software system generators to implement component-based
                 models of software synthesis in the target domain
                 [SEI90]. In this paper, we present the ADAGE
                 component-based model (or reference architecture) for
                 avionics software synthesis. We explain the modeling
                 procedures used, review our initial goals, show how
                 component reuse is achieved, and examine what we were
                 (and were not) able to accomplish. The contributions of
                 our paper are the avionics reference architecture and
                 the lessons that we learned; both may be beneficial to
                 others in future modeling efforts.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
  remark =       "SSR '95 Proceedings of the 1995 Symposium on Software
                 reusability.",
}

@Article{Davis:1995:ARC,
  author =       "Margaret J. Davis",
  title =        "Adaptable, reusable code",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "SI",
  pages =        "38--46",
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/223427.211789",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/adabooks.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This paper discusses the concept of adaptability as a
                 means for reaping the cost and schedule reduction
                 benefits of reuse. Adaptability strives to implement
                 the variability identified by domain analyses while
                 managing the cost of implementation, extension, and
                 use. The paper discusses a context for understanding
                 different domain-specific reuse approaches relative to
                 adaptability and analyzes experience in designing and
                 developing adaptable code. The experience is drawn from
                 the ARPA Software Technology for Adaptable, Reliable
                 Systems (STARS) joint demonstration project with U.S.
                 Navy.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
  remark =       "SSR '95 Proceedings of the 1995 Symposium on Software
                 reusability.",
}

@Article{Bieman:1995:RTI,
  author =       "James M. Bieman and Josephine Xia Zhao",
  title =        "Reuse through inheritance: a quantitative study of
                 {C++} software",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "SI",
  pages =        "47--52",
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/223427.211794",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "According to proponents of object-oriented
                 programming, inheritance is an excellent way to
                 organize abstraction and a superb tool for reuse. Yet,
                 few quantitative studies of the actual use of
                 inheritance have been conducted. Quantitative studies
                 are necessary to evaluate the actual usefulness of
                 structures such as inheritance. We characterize the use
                 of inheritance in 19 existing C++ software systems
                 containing 2,744 classes. We measure the class depth in
                 the inheritance hierarchies, and the number of child
                 and parent classes in the software. We find that
                 inheritance is used far less frequently than
                 expected.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
  remark =       "SSR '95 Proceedings of the 1995 Symposium on Software
                 reusability.",
}

@Article{BenGhezala:1995:RAB,
  author =       "Henda Hadjami {Ben Ghezala} and Farouk Kamoun",
  title =        "A reuse approach based on object orientation: its
                 contributions in the development of {CASE} tools",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "SI",
  pages =        "53--62",
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/223427.211798",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The aim of this paper is to present an approach to
                 facilitate reuse. This approach, which is based on an
                 object oriented design method, describes a way of
                 structuring components and reuse library. Two concepts,
                 domain and theme, are introduced to allow a
                 classification of components by the services that they
                 offer and by application domain. The library itself is
                 organized in three hierarchical levels -general,
                 dedicated and personal-, where the reusable components
                 are stored according to their degree of ``interest''
                 (general interest, by application type or particular).
                 So, the library is generic and could cluster various
                 reusable component types (specification components,
                 design components, packages,{\ldots}). The
                 contributions of this approach in the development of
                 CASE tools are also emphasized.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
  remark =       "SSR '95 Proceedings of the 1995 Symposium on Software
                 reusability.",
}

@Article{Mambella:1995:IAS,
  author =       "E. Mambella and R. Ferrari and F. D. Carli and A. L.
                 Surdo",
  title =        "An integrated approach to software reuse practice",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "SI",
  pages =        "63--80",
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/223427.211805",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Since 1993, Sodalia's Software Engineers have been
                 studying a reuse program whose goal is making software
                 reuse a significant and systematic part of the software
                 process. The Sodalia's Corporate Reuse Program is
                 intended to develop a Software Reuse Process that
                 incorporates reuse-specific activities along the
                 Object-Oriented Software Development Process, and a
                 reuse library to support the classification and
                 management of reusable components. This paper focuses
                 on the on-going experience of Sodalia in the gradual
                 introduction of reuse practice in the organization,
                 illustrates the evolutionary stages, and the reached
                 results.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
  remark =       "SSR '95 Proceedings of the 1995 Symposium on Software
                 reusability.",
}

@Article{Gennari:1995:RPI,
  author =       "John H. Gennari and Russ B. Altman and Mark A. Musen",
  title =        "Reuse with {PROT{\'E}G{\'E}-II}: from elevators to
                 ribosomes",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "SI",
  pages =        "72--80",
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/223427.316710",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
  remark =       "SSR '95 Proceedings of the 1995 Symposium on Software
                 reusability.",
}

@Article{Castano:1995:BRC,
  author =       "S. Castano and V. {De Antonellis} and B. Pernici",
  title =        "Building reusable components in the public
                 administration domain",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "SI",
  pages =        "81--87",
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/223427.211809",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The paper proposes methods and tools for building
                 reusable components from families of Information System
                 conceptual schemas, based on the identification of
                 similar components in different schemas, and on their
                 engineering into normalized descriptions. Clustering
                 and abstraction techniques to help identifying similar
                 components, and techniques to build corresponding
                 reusable components are described in the paper.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
  remark =       "SSR '95 Proceedings of the 1995 Symposium on Software
                 reusability.",
}

@Article{Alencar:1995:FSR,
  author =       "P. S. C. Alencar and D. D. Cowan and C. J. P. Lucena
                 and L. C. M. Nova",
  title =        "Formal specification of reusable interface objects",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "SI",
  pages =        "88--96",
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/223427.211811",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "In this paper we present a formal approach of a new
                 object-oriented design concept to support
                 reuse-in-the-large called Abstract Data Views (ADVs).
                 The ADV approach was created to specify clearly and
                 formally the separation of interfaces from the
                 application components of a software system. Such an
                 approach should lead to high degree of reuse of designs
                 for both interface and application components. Our
                 specification framework is based on descriptive schemas
                 for both ADVs and ADOs, that are the basic building
                 blocks for the system specification, design, and
                 implementation using the ADV approach. These schemas
                 describe the structural, static, and dynamic features
                 of each system object, and include the specification of
                 the concurrent operation of system components.
                 Additionally, such schemas can be seen as an underlying
                 structure to support the development of a specification
                 language that describes the interconnection between
                 interface and application components.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
  remark =       "SSR '95 Proceedings of the 1995 Symposium on Software
                 reusability.",
}

@Article{Jeng:1995:SMS,
  author =       "Jun-Jang Jeng and Betty H. C. Cheng",
  title =        "Specification matching for software reuse: a
                 foundation",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "SI",
  pages =        "97--105",
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/223427.211817",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Using formal specifications to represent software
                 components facilitates the determination of reusability
                 because they more precisely characterize the
                 functionality of the software, and the well-defined
                 syntax makes processing amenable to automation. We
                 present specification matching as a method for
                 classification, retrieval, and modification of reusable
                 components. A software component is specified in terms
                 of order-sorted predicate logic. For both components
                 and methods, we consider not only exact match, but also
                 relaxed match and logical match for performing
                 specification matching over a library of reusable
                 software components.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
  remark =       "SSR '95 Proceedings of the 1995 Symposium on Software
                 reusability.",
}

@Article{Caplan:1995:LFS,
  author =       "Joshua E. Caplan and Mehdi T. Harandi",
  title =        "A logical framework for software proof reuse",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "SI",
  pages =        "106--113",
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/223427.211821",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "We describe a logical framework PR for verification of
                 reusable software components. Within our system,
                 developers can employ the advantages traditionally
                 associated with software reuse to reduce the cost of
                 software verification by reusing abstract proofs and
                 specifications. One can construct an algorithm with
                 parameters, a specification with parameters, and a
                 proof that the algorithm satisfies the specification
                 provided the parameters satisfy certain conditions.
                 Proofs in PRwill themselves contain parameters for
                 subproofs concerning those conditions. In this
                 framework, typing, type checking, and proof checking
                 are decidable.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
  remark =       "SSR '95 Proceedings of the 1995 Symposium on Software
                 reusability.",
}

@Article{Jarzabek:1995:RLE,
  author =       "Stan Jarzabek",
  title =        "From reuse library experiences to application
                 generation architectures",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "SI",
  pages =        "114--122",
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/223427.211823",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Reuse through application generators has been
                 successful in the area of programming language systems.
                 We analyzed three language system projects that
                 realized transition from the initial ad hoc programs,
                 through libraries of reusable modules to application
                 generator solutions. We tried to understand the
                 underlying thinking process and technical factors that
                 made such a transition possible. Based on this study,
                 we generalized reuse experiences gained in the language
                 system domain and formulated a reuse implementation
                 framework. Our framework is to facilitate transition
                 from component-based reuse to application generators in
                 other domains. Ultimately, we hope our framework will
                 offer reuse implementation guidelines for companies to
                 realize such a transition. Initial findings are
                 described in this paper.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
  remark =       "SSR '95 Proceedings of the 1995 Symposium on Software
                 reusability.",
}

@Article{Schappert:1995:ASS,
  author =       "Albert Schappert and Peter Sommerlad and Wolfgang
                 Pree",
  title =        "Automated support for software development with
                 frameworks",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "SI",
  pages =        "123--127",
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/223427.211824",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This document presents some of the results of an
                 industrial research project on automation of software
                 development. The project's objective is to improve
                 productivity and quality of software development. We
                 see software development based on frameworks and
                 libraries of prefabricated components as a step in this
                 direction. An adequate development style consists of
                 two complementary activities: the creation of
                 frameworks and new components for functionality not
                 available and the composition and configuration of
                 existing components. Just providing adequate frameworks
                 and components does not necessarily yield automation
                 and efficiency of software development. We developed
                 the concept of relations between software components as
                 a foundation for abstraction, reuse and automatic code
                 generation for component interrelationship. Furthermore
                 we suggest to supplement frameworks with an active
                 cookbook consisting of active recipes which guide the
                 software developer in the use of framework elements. In
                 this paper our concept of using relations among
                 software components is presented and the active
                 cookbook is illustrated as a means for developer
                 guidance. We created a prototype to demonstrate these
                 concepts.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
  remark =       "SSR '95 Proceedings of the 1995 Symposium on Software
                 reusability.",
}

@Article{Sugiyama:1995:OMT,
  author =       "Yasuhiro Sugiyama",
  title =        "Object make: a tool for constructing software systems
                 from existing software components",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "SI",
  pages =        "128--136",
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/223427.211826",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
  remark =       "SSR '95 Proceedings of the 1995 Symposium on Software
                 reusability.",
}

@Article{Dusink:1995:RD,
  author =       "Liesbeth Dusink and Jan van Katwijk",
  title =        "Reuse dimensions",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "SI",
  pages =        "137--149",
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/223427.211828",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "In recent years, there have been much publications on
                 reuse. In order to bet an overview of the whole field
                 and also a good impression of the state of the reuse
                 art, we studied reuse literature of the last few years.
                 As basis for comparison, we classified literature
                 according to four (more or less orthogonal) dimensions,
                 based on the actions and knowledge of the reuser, i.e.
                 the software engineer. The dimensions are: actions to
                 be taken to get an existing reusable item; knowledge to
                 be applied to find an existing reusable item; actions
                 to be taken to build the complete system needed;
                 knowledge to be applied to get the complete system
                 needed. The survey shows that research on reuse from
                 the viewpoint of needed system, receives far less
                 attention than research from the viewpoint of reusable
                 artifacts. We expect reuse to live up to its promise if
                 this topic is addressed was well.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
  remark =       "SSR '95 Proceedings of the 1995 Symposium on Software
                 reusability.",
}

@Article{Fowler:1995:PWR,
  author =       "Glenn S. Fowler and David G. Korn and Kiem-Phong Vo",
  title =        "Principles for writing reusable libraries",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "SI",
  pages =        "150--159",
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/223427.211834",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Over the past 10 years, the Software Engineering
                 Research Department in AT\&T has been engaging in a
                 research program to build a collection of highly
                 portable advanced software tools known as Ast, Advanced
                 Software Technology. A recent monograph, ``Practical
                 Reusable UNIX Software'' (John Wiley \& Sons, Inc.,
                 1995), summarizes the philosophy and components of this
                 research program. A major component of this program is
                 a collection of portable, and reusable libraries
                 servicing a wide range of functions, from a porting
                 base to all known UNIX platforms, to efficient buffered
                 I/O, memory allocation, data compression, and
                 expression evaluation. The libraries currently stand at
                 about 150,000 non-commented lines of C code. They are
                 developed and maintained independently by different
                 researchers. Yet they work together seamlessly ---
                 largely because of a collection of library design
                 principles and conventions developed to help
                 maintaining interface consistency and reducing needless
                 or overlapped work.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
  remark =       "SSR '95 Proceedings of the 1995 Symposium on Software
                 reusability.",
}

@Article{Poulin:1995:MSA,
  author =       "Jeffrey S. Poulin and Keith J. Werkman",
  title =        "Melding structured abstracts and World Wide {Web} for
                 retrieval of reusable components",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "SI",
  pages =        "160--168",
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/223427.211841",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Reusable Software Libraries (RSLs) often suffer from
                 poor interfaces, too many formal standards, high levels
                 of training required for their use, and most of all, a
                 high cost to build and maintain. Hence, RSLs have
                 largely failed to return the reuse benefits promised by
                 their developers. This paper first describes an RSL
                 implementation using the World Wide Web (WWW) browser
                 Mosaic and shows how it meets most RSL needs, avoids
                 most RSL pitfalls, and costs only a fraction of the
                 cost for the average commercial RSL. Second, the paper
                 describes a way to quickly assess the important aspects
                 of a piece of software so programmers can decide
                 whether or not to reuse it. Using the observation that
                 when programmers discuss software they tend to convey
                 the same key information in a somewhat predictable
                 order, this paper describes a method to automatically
                 mimic this activity using a Structured Abstract of
                 reusable components. Structured Abstracts provide a
                 natural, easy to use way for developers to (1) search
                 for components, (2) quickly assess the component for
                 use, and (3) submit components to the RSL.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
  remark =       "SSR '95 Proceedings of the 1995 Symposium on Software
                 reusability.",
}

@Article{Lung:1995:ACD,
  author =       "Chung-Horng Lung and Joseph E. Urban",
  title =        "An approach to the classification of domain models in
                 support of analogical reuse",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "SI",
  pages =        "169--178",
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/223427.211842",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This paper presents an approach to classify domain
                 models in order to facilitate reuse through analogy.
                 Domain analysis plays a critical role for systematic
                 reuse, but domain analysis is difficult to perform,
                 especially for new application areas. Analogical
                 approach to reuse can support the domain analysis
                 process by providing software products in a different
                 but analogous domain. In order to achieve this goal,
                 domain models need to be classified. This paper
                 proposes a classification method for domain models. The
                 method is an integration of the enumerative hierarchy
                 and faceted scheme. The classification approach can
                 help the domain analyst to locate an analogous domain
                 to perform the modeling and analysis process. Moreover,
                 the approach is more flexible and more descriptive than
                 conventional classification methods.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
  remark =       "SSR '95 Proceedings of the 1995 Symposium on Software
                 reusability.",
}

@Article{Browne:1995:LIN,
  author =       "Shirley Browne and Jack Dongarra and Stan Green and
                 Keith Moore and Theresa Pepin and Tom Rowan and Reed
                 Wade",
  title =        "Location-independent naming for virtual distributed
                 software repositories",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "SI",
  pages =        "179--185",
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/223427.211843",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/bibnet/authors/d/dongarra-jack-j.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "A location-independent naming system for network
                 resources has been designed to facilitate organization
                 and description of software components accessible
                 through a virtual distributed repository. This naming
                 system enables easy and efficient searching and
                 retrieval, and it addresses many of the consistency,
                 authenticity, and integrity issues involved with
                 distributed software repositories by providing
                 mechanisms for grouping resources and for authenticity
                 and integrity checking. This paper details the design
                 of the naming system, describes how the system fits
                 into the development of the National HPCC Software
                 Exchange, an virtual software repository that has the
                 goal of providing access to reusable software
                 components for high-performance computing.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
  remark =       "SSR '95 Proceedings of the 1995 Symposium on Software
                 reusability.",
}

@Article{Henninger:1995:DDK,
  author =       "Scott Henninger",
  title =        "Developing domain knowledge through the reuse of
                 project experiences",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "SI",
  pages =        "186--195",
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/223427.211844",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Software development is no longer a homogeneous field.
                 Software is being developed for an increasingly diverse
                 set of applications and user populations, each with
                 different characteristics and development constraints.
                 As a consequence, researchers and practitioners have
                 begun to realize the importance of identifying and
                 understanding the characteristics and special
                 development needs of application domains. This paper
                 presents a method for developing and refining knowledge
                 about application domains by creating a repository of
                 project experiences. Subsequent projects can then
                 benefit from these experiences by locating similar
                 projects and reusing the knowledge accumulated in the
                 repository. We develop a framework for a system to
                 capture relationships between development projects and
                 resources for developing software, including process
                 models, methods, technologies, and tools. We then show
                 how this information can be reused to improve the
                 productivity and quality of software development
                 efforts.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
  remark =       "SSR '95 Proceedings of the 1995 Symposium on Software
                 reusability.",
}

@Article{Simos:1995:ODM,
  author =       "Mark A. Simos",
  title =        "Organization domain modeling {(ODM)}: formalizing the
                 core domain modeling life cycle",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "SI",
  pages =        "196--205",
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/223427.211845",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Researchers and practitioners are looking for
                 systematic ways of comparing domain analysis (DA)
                 methods. Comparisons have often focused on linkage
                 between DA methods and related technologies such as
                 systems modeling. Less attention has been paid to
                 comparing DA methods in terms of certain core
                 methodological issues, including problems of scoping,
                 contextualizing, descriptive vs. prescriptive modeling,
                 and formalized models of variability. This paper
                 presents key aspects of Organization Domain Modeling
                 (ODM), a systematic domain analysis method structured
                 in terms of a core domain modeling life cycle directly
                 addressing these methodological concerns.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
  remark =       "SSR '95 Proceedings of the 1995 Symposium on Software
                 reusability.",
}

@Article{France:1995:ADA,
  author =       "Robert B. France and Thomas B. Horton",
  title =        "Applying domain analysis and modeling: an industrial
                 experience",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "SI",
  pages =        "206--214",
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/223427.211846",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "In this paper we describe our experience in applying
                 domain analysis within a company that develops personal
                 electronic devices. We describe how we tailored the
                 DSSA method to suit our needs and then present the
                 process and representations that we found most useful
                 for this situation. The conclusions and lessons learned
                 are useful because few studies published at this time
                 provide details about applications of domain
                 engineering in commercial development environments.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
  remark =       "SSR '95 Proceedings of the 1995 Symposium on Software
                 reusability.",
}

@Article{Bhansali:1995:HAS,
  author =       "Sanjay Bhansali",
  title =        "A hybrid approach to software reuse",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "SI",
  pages =        "215--218",
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/223427.211847",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "We describe a hybrid approach to software reuse in an
                 ongoing project that addresses a challenging software
                 engineering task. The approach is driven by an
                 architectural design and makes use of both code
                 components and program synthesis technology. We
                 describe criteria that were used in choosing the reuse
                 strategy for different parts of the application and
                 argue that to be successful a reuse strategy must be
                 driven by the needs of an application program instead
                 of adapting a software development strategy around a
                 reuse program.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
  remark =       "SSR '95 Proceedings of the 1995 Symposium on Software
                 reusability.",
}

@Article{Wasmund:1995:SIR,
  author =       "Michael Wasmund",
  title =        "The spin-off illusion: reuse is not a by-product",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "SI",
  pages =        "219--221",
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/223427.211848",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Based on the desire of enterprise management to find a
                 smooth, low-risk way of introducing reuse methodology,
                 this paper discusses several approaches taken. The
                 illusion of using the by-product of software
                 development to obtain reusable assets is the subject of
                 the second approach. The third successful approach
                 follows the software factory paradigm and has been
                 successfully implemented at several IBM sites.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
  remark =       "SSR '95 Proceedings of the 1995 Symposium on Software
                 reusability.",
}

@Article{Fraser:1995:PTD,
  author =       "Steven Fraser and Deborah Leishman and Robert
                 McLellan",
  title =        "Patterns, teams and domain engineering",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "SI",
  pages =        "222--224",
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/223427.211849",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
  remark =       "SSR '95 Proceedings of the 1995 Symposium on Software
                 reusability.",
}

@Article{Gall:1995:RDS,
  author =       "Harald Gall and Mehdi Jazayeri and Ren{\'e}
                 Kl{\"o}sch",
  title =        "Research directions in software reuse: where to go
                 from here?",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "SI",
  pages =        "225--228",
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/223427.211850",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Software reuse is no longer in its infancy. We are
                 able to look back at more than 15 years of research and
                 should use the opportunity of such a symposium to
                 critically evaluate the past research in order to
                 identify promising future research areas in software
                 reuse. In this paper, we give a broader view of reuse
                 and some of the so far less-considered areas, which we
                 believe may support software reuse to get off the
                 ground. We mention our ongoing research in software
                 reuse, discussing reuse experiments in the areas of
                 long-term software evolution and component programming.
                 Furthermore, we indicate the critical importance of
                 interactions among the reuse and related communities
                 within software engineering, such as the
                 object-oriented and the software maintenance
                 communities.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
  remark =       "SSR '95 Proceedings of the 1995 Symposium on Software
                 reusability.",
}

@Article{Gacek:1995:EDA,
  author =       "Cristina Gacek",
  title =        "Exploiting domain architectures in software reuse",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "SI",
  pages =        "229--232",
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/223427.211851",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This paper provides motivation towards the use of
                 domain specific repositories and DSSA's. It shows many
                 of the positive side-effects this usage brings about.
                 An extension to the faceted approach to components
                 classification [Prieto-Diaz and Freeman 1987] is
                 introduced. Our extension suggests a natural way of
                 further benefiting from the use of domain specific
                 repositories.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
  remark =       "SSR '95 Proceedings of the 1995 Symposium on Software
                 reusability.",
}

@Article{Ransom:1995:SSR,
  author =       "Keith J. Ransom and Chris D. Marlin",
  title =        "Supporting software reuse within an integrated
                 software development environment (position paper)",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "SI",
  pages =        "233--237",
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/223427.211852",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Significant gains in programmer productivity have been
                 achieved through the use of simple abstraction
                 mechanisms that enhance the reuse of code. There are
                 other useful forms of abstraction (over arbitrary
                 identifier bindings, for example) which could further
                 increase reuse rates, but are not well supported by
                 programming languages; such forms may be better
                 expressed by exploiting mechanisms provided by an
                 integrated programming environment. This paper outlines
                 ongoing work which aims to provide programming
                 environment mechanisms that support the reuse of code
                 via various forms of abstraction that complement those
                 traditionally provided by programming languages. The
                 concept of derivation-based reuse is also defined, and
                 a generic framework for its support is outlined. In
                 addition, a collection of environment mechanisms,
                 intended to fit within this framework, are outlined.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
  remark =       "SSR '95 Proceedings of the 1995 Symposium on Software
                 reusability.",
}

@Article{Dai:1995:DRE,
  author =       "W. Dai",
  title =        "Development of reusable expert system components:
                 preliminary experience",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "SI",
  pages =        "238--246",
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/223427.211853",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This paper addresses the metrics of expert system
                 reusability through practical experience obtained in
                 developing and using a previously implemented system
                 called INDEX. It presents a principled approach in
                 defining expert system component granularity,
                 transparency, and a specification methodology in
                 identifying and building reusable expert system
                 skeletons and components to allow them to be used in
                 most conventional software environments. The adoption
                 of such an approach has led to the production of
                 reusable expert system components for different expert
                 system development projects. The preliminary experience
                 in reusing INDEX facilities has been presented. Two
                 applications are chosen to show the effectiveness of
                 such an approach.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
  remark =       "SSR '95 Proceedings of the 1995 Symposium on Software
                 reusability.",
}

@Article{Voas:1995:STE,
  author =       "J. Voas and J. Payne and R. Mills and J. McManus",
  title =        "Software testability: an experiment in measuring
                 simulation reusability",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "SI",
  pages =        "247--255",
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/223427.211854",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Software reuse can be more readily enabled if the
                 testing of the code in the previous environment is
                 still applicable to the new environment. The
                 reusability of previous verification efforts is an
                 important parameter is assessing the ``immediate''
                 reusability of the code; in this paper, the
                 verification technique that we are focusing on is
                 software testing. This paper presents the use of a
                 software testability measure, sensitivity analysis, as
                 a quantitative assessment of the reusability of
                 previous verification. The ability to reuse
                 verification is a factor to consider in determining the
                 reusability of code. We have applied this technique to
                 a large NASA supersonic software simulation, High Speed
                 Civil Transport (HSCT), and the reusability results of
                 that application suggest a possible concern about the
                 sufficiency of the original verification.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
  remark =       "SSR '95 Proceedings of the 1995 Symposium on Software
                 reusability.",
}

@Article{Gomaa:1995:DMM,
  author =       "Hassan Gomaa",
  title =        "Domain modeling methods and environments",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "SI",
  pages =        "256--258",
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/223427.211855",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
  remark =       "SSR '95 Proceedings of the 1995 Symposium on Software
                 reusability.",
}

@Article{Bieman:1995:CRO,
  author =       "James M. Bieman and Byung-Kyoo Kang",
  title =        "Cohesion and reuse in an object-oriented system",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "SI",
  pages =        "259--262",
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/223427.211856",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "We define and apply two new measures of
                 object-oriented class cohesion to a reasonably large
                 C++ system. We find that most of the classes are quite
                 cohesive, but that the classes that are reused more
                 frequently via inheritance exhibit clearly lower
                 cohesion.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
  remark =       "SSR '95 Proceedings of the 1995 Symposium on Software
                 reusability.",
}

@Article{Paredes:1995:RRS,
  author =       "Carlos Paredes and Jos{\'e} Luiz Fiadeiro",
  title =        "Reuse of requirements and specifications: a formal
                 framework",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "SI",
  pages =        "263--266",
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/223427.211857",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "It is claimed that requirements engineering, as a
                 problem of formalization and agreement, can benefit
                 from raising the level of reusability up to functional
                 requirements elicitation and specification levels. At
                 these levels, it is important to support incomplete
                 information in a declarative, reusable and refineable
                 form. For that purpose, a model is proposed which is
                 based on temporal theories, in the logical sense,
                 together with a set of incremental specification
                 techniques formalized through categorial constructions
                 on theories.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
  remark =       "SSR '95 Proceedings of the 1995 Symposium on Software
                 reusability.",
}

@Article{Henninger:1995:SPS,
  author =       "Scott Henninger",
  title =        "Supporting the process of satisfying information needs
                 with reusable software libraries: an empirical study",
  journal =      j-SIGSOFT,
  volume =       "20",
  number =       "SI",
  pages =        "267--270",
  year =         "1995",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/223427.211858",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Retrieval tools for component-based software reuse
                 libraries face two interrelated problems. The first is
                 the ill-defined nature of information needs. The second
                 is that large repositories will often use unfamiliar
                 and esoteric vocabulary to describe software
                 components. CodeFinder, a retrieval system designed to
                 help developers locate software components for reuse,
                 addresses these issues through an innovative
                 combination of retrieval by reformulation and spreading
                 activation. An empirical study comparing CodeFinder
                 with two other systems showed evidence that subjects
                 using CodeFinder with ill-defined tasks or mismatching
                 vocabulary performed better than subjects using the
                 other systems. The study confirmed the utility of
                 spreading activation and retrieval by reformulation
                 techniques for satisfying information needs of the kind
                 encountered in software design.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
  remark =       "SSR '95 Proceedings of the 1995 Symposium on Software
                 reusability.",
}

@Article{Notkin:1996:LEC,
  author =       "David Notkin",
  title =        "Letter from the executive committee",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "1",
  pages =        "1--1",
  day =          "1",
  month =        jan,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/381790.381791",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:06 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Leciston:1996:LE,
  author =       "David John Leciston",
  title =        "Letter to the editor",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "1",
  pages =        "2--5",
  day =          "1",
  month =        jan,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/381790.381793",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:06 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Howell:1996:SNS,
  author =       "Chuck Howell",
  title =        "Surfing the net for {{\booktitle{Software Engineering
                 Notes}}}",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "1",
  pages =        "6--10",
  day =          "1",
  month =        jan,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/381790.381794",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:06 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Kitchenham:1996:ESEa,
  author =       "Barbara Ann Kitchenham",
  title =        "Evaluating software engineering methods and tool part
                 1: The evaluation context and evaluation methods",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "1",
  pages =        "11--14",
  day =          "1",
  month =        jan,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/381790.381795",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:06 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "In the last five issues of SIGSOFT Notes, Shari
                 Lawrence Pfleeger has discussed the use of formal
                 experiments to evaluate software engineering methods
                 and tools [1]. Shari's articles were based on work she
                 performed for the U.K. DESMET project which aimed to
                 develop a methodology for evaluating software
                 engineering methods and tools. The DESMET project
                 identified a number of useful evaluation methods in
                 addition to formal experiments, and Shari asked me to
                 continue this column by describing some of other
                 methods. As a starting point, I will give an overview
                 of the scope of the DESMET methodology in this article
                 and describe the nine different evaluation methods
                 DESMET identified. In the next few articles I will
                 discuss criteria for selecting a specific method in
                 particular circumstances. Later I will present the
                 DESMET guidelines for performing quantitative case
                 studies and feature analysis.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Sitaraman:1996:ISR,
  author =       "Murali Sitaraman",
  title =        "4th international software reuse conference overview",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "1",
  pages =        "15--15",
  day =          "1",
  month =        jan,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/381790.381796",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:06 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Neumann:1996:IRP,
  author =       "Peter G. Neumann",
  title =        "Illustrative risks to the public in the use of
                 computer systems and related technology",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "1",
  pages =        "16--30",
  day =          "1",
  month =        jan,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/381790.381797",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:06 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Pohl:1996:WSS,
  author =       "Klaus Pohl and Peter Peters",
  title =        "Workshop summary {Second International Workshop on
                 Requirements Engineering: Foundation of Software
                 Quality}",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "1",
  pages =        "31--34",
  day =          "1",
  month =        jan,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/381790.381798",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:06 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "As achieving high quality means the realization of
                 customers needs, requirements engineering (RE) is the
                 most crucial phase within software development. During
                 RE not only the functional requirements but also the
                 so-called 'non-functional' requirements of the planned
                 software system have to be elicited from the customer
                 and represented in a requirements document in order to
                 provide the software designer with a complete and
                 correct specification. Conventional RE methods normally
                 support only parts of this process or help stating only
                 specific kinds of requirements. These methodological
                 problems are the prime motivation for the REFSQ
                 workshop series held in conjunction with the CAiSE
                 Conference on Advanced Information Systems Engineering.
                 In order to find solutions which handle the described
                 deficiencies it is the goal of this workshop series to
                 improve the understanding of the relations between RE
                 and software quality. This year's workshop, REFSQ'95,
                 was held in conjunction with CAiSE'95 in Jyvaskyla,
                 Finland on June 12th and 13th 1995. After the reviewing
                 process we accepted 12 out of the 18 papers submitted.
                 Finally, 11 full and position papers were presented at
                 REFSQ'95 and discussed with the 15 participants
                 (including the organizers). The participants came from
                 9 different countries.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Benner:1996:OSR,
  author =       "Kevin Benner",
  title =        "{``The Organization''} (or Software Reuse in a
                 Business Environment)",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "1",
  pages =        "35--39",
  day =          "1",
  month =        jan,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/381790.565660",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:06 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Latour:1996:WAW,
  author =       "Larry Latour and Kevin Wentzel",
  title =        "{WISR'95: 7th Annual Workshop on Software Reuse}
                 summary and working group reports",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "1",
  pages =        "35--54",
  day =          "1",
  month =        jan,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/381790.381799",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:06 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Bailin:1996:DPE,
  author =       "Sid Bailin",
  title =        "Domain Processes and Engineering",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "1",
  pages =        "39--42",
  day =          "1",
  month =        jan,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/381790.565661",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:06 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Simos:1996:DMR,
  author =       "Mark Simos",
  title =        "Domain Modeling Representation Strategies: Towards a
                 Comparative Framework",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "1",
  pages =        "42--46",
  day =          "1",
  month =        jan,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/381790.565663",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:06 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Frakes:1996:RP,
  author =       "Bill Frakes",
  title =        "The Reuse of Processes",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "1",
  pages =        "46",
  day =          "1",
  month =        jan,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/381790.565674",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:06 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Edwards:1996:MAS,
  author =       "Steve Edwards",
  title =        "Micro-Architecture of Software Components and The Need
                 For Good Mental Models of Software Subsystems",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "1",
  pages =        "46--50",
  day =          "1",
  month =        jan,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/381790.565664",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:06 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Because of similar interests, these two groups
                 initially met together, and then decided to jointly
                 pursue both topics. From the micro-architecture
                 perspective, the group was interested in the details of
                 both the structure and the behavior of software
                 component interfaces and on the implementations of
                 individual components, sets of components, and how they
                 compose and ``interoperate'' with each other. From the
                 mental models perspective the group was interested in
                 exploring the methods by which humans develop good
                 mental models of generic software subsystems, the
                 methods by which one can design software interfaces
                 that ``project'' easy-to-assimilate mental models, and
                 how existing programming languages support/hinder these
                 efforts.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Griss:1996:SOR,
  author =       "Martin L. Griss",
  title =        "Systematic {OO} Reuse --- a Tale Of Two Cultures",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "1",
  pages =        "50--52",
  day =          "1",
  month =        jan,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/381790.565675",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:06 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Davis:1996:BIU,
  author =       "Margaret J. Davis",
  title =        "Barriers to Institutionalizing Using Current Tools and
                 Environments",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "1",
  pages =        "52--54",
  day =          "1",
  month =        jan,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/381790.565677",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:06 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Svoboda:1996:SWS,
  author =       "Frank Svoboda and Fred Maymir-Ducharme and Jeff
                 Poulin",
  title =        "{SRI} workshop summary: ``domain analysis in the
                 {DoD}''",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "1",
  pages =        "55--67",
  day =          "1",
  month =        jan,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/381790.381800",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:06 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The Workshop on ``Domain Analysis in the DoD,''
                 sponsored by the Software Reuse Initiative (SRI) and
                 Defense Information Systems Agency (DISA), was held at
                 MITRE Corporation, in McLean, Virginia on 26 --- 27
                 September 1995. The primary purpose of the workshop was
                 to discuss issues related to identifying and scoping
                 domains with emphasis on product lines and to assess
                 the usefulness of the strawman SRI Domain Scoping
                 Framework as a proposed basis for this scoping
                 activity. To this end, two specific objectives were
                 identified:1. to identify the barriers facing Program
                 Executive Offices (PEOs) and Program Managers (PMs) in
                 incorporating domain analysis technology in their
                 organizations and programs and2. to recommend a range
                 of solutions and/or approaches to address and overcome
                 these barriers. Many DoD and Industry programs can
                 benefit from the application of domain analysis
                 technology (concepts, processes, methods, and tools).
                 However, PEOs/PMs rarely have enough information
                 regarding why, when, or how to use domain analysis on
                 their programs. A more basic question is whether there
                 are sufficient reuse benefits within an
                 organization/domain to warrant the associated
                 investment in domain engineering --- does a product
                 line exist that justifies reuse costs? The solution to
                 this problem involves bringing together leading domain
                 analysis experts and PEO/PM representatives and
                 managers to discuss a framework, currently under
                 development by the DoD SRI, to guide DoD managers in
                 applying domain analysis in their organizations and
                 programs. The workshop brought together over fifty
                 representatives from DoD, commercial, and academic
                 organizations, with varied interests and perspectives
                 on Domain Analysis, including those of methodologist,
                 practitioner, management, and customer. The workshop
                 approach included a Program Management panel, Domain
                 Analysis Experts panel, a follow-up plenary discussion
                 session and two working group sessions. In the working
                 groups, the attendees were divided into 5 color-coded
                 teams: Blue, Green, Gold, Orange, and Red, and were
                 instructed to (1) identify issues in performing domain
                 scoping, using the SRI Domain Scoping Framework as a
                 ``strawman''; and (2) make recommendations for
                 improving the framework and applying its principles in
                 real-world situations. The teams were chosen to provide
                 a diversified mix of view-points. Each team included a
                 facilitator/rapporteur (responsible for keeping the
                 discussion activities relevant to the task at hand) and
                 a Framework expert (who served as the technical
                 authority on issues relating to framework content). The
                 general team approach involved focusing on issues and
                 actions within the individual teams and then looking
                 across teams for common threads in the plenary
                 sessions. The ultimate goal was to build consensus and
                 move ahead with implementation recommendations.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Garg:1996:FCS,
  author =       "Pankaj K. Garg and Sriram Sankar",
  title =        "Fifth {California} software symposium",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "1",
  pages =        "68--70",
  day =          "1",
  month =        jan,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/381790.381801",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:06 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The California Software Symposium (CSS), which was
                 held this year on March 30 at the University of
                 California, Irvine, is the fifth in a series of
                 symposia held annually in southern California.
                 Previously, it was called the Irvine Software
                 Symposium, and was organized by the University of
                 California, Irvine. Starting this year, the event is
                 co-organized by University of California, Irvine; and
                 University of Southern California, Los Angeles (hence
                 the name change). The symposium will be located
                 alternately at the two organizing sites --- the next
                 will be at the University of Southern California in
                 April 1996. The purpose of this symposium is to bring
                 together researchers and practitioners to share ideas
                 and experiences in areas of software engineering. This
                 year, a successful tools fair organized by IRUS (Irvine
                 Research Unit in Software) was co-located with the
                 symposium. The participating vendors were: Atria,
                 Cadre, Continuus, IDE, Intersolv, Mark V, Rational,
                 Softool, and Sun. The symposium is slowly gaining
                 momentum and there has been a noticeable increase in
                 the number of papers submitted and in participation. We
                 anticipate further growth in the coming years. The
                 symposium was co-chaired this year by Barry Boehm
                 (USC), and Debra Richardson (UCI). The program
                 committee consisted of 22 people, with a good mixture
                 of academic and industrial representatives. For further
                 information on the upcoming CSS or for any other
                 related information, please contact Debra Brodbeck
                 (714-824-2260, [email protected]) or Sandra Lapis
                 (213-740-5703, [email protected]).",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Nourani:1996:MAO,
  author =       "Cyrus F. Nourani",
  title =        "Multi-agent object level {AI} validation and
                 verification",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "1",
  pages =        "70--72",
  day =          "1",
  month =        jan,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/381790.381802",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:06 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "A Methodology for validation and verification of AI
                 systems in aerospace is presented. The approach is
                 applicable to both systems that are already coded and
                 to those that are to be designed. Design methods are
                 proposed that can be applied to (reverse projected
                 from) AI systems that are designed in the field and
                 already coded. We note that there are well-developed
                 software validation and verification methods that can
                 be applied to the AI systems if an appropriate
                 methodology is applied for validation of AI systems.
                 Thus rather than reinventing methods for AI validation,
                 we only invent methods to allow us to reduce to known
                 problems in software validation and verification
                 methodologies.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Wartik:1996:SYR,
  author =       "Steve Wartik",
  title =        "Slow down, you read too fast",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "1",
  pages =        "73--74",
  day =          "1",
  month =        jan,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/381790.381803",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:06 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Carey:1996:SQI,
  author =       "Dick Carey",
  title =        "Is Software Quality Intrinsic, Subjective, or
                 Relational?",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "1",
  pages =        "74--75",
  day =          "1",
  month =        jan,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/381790.565678",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:06 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Bruce:1996:IAM,
  author =       "Michael Bruce",
  title =        "{Internet} agility\slash Maturity model survey for the
                 software industry call for participation",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "1",
  pages =        "75--76",
  day =          "1",
  month =        jan,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/381790.381804",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:06 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This project is the first phase of M.S. thesis
                 research performed by Michael Bruce, a graduate student
                 at the Information Networking Institute of Carnegie
                 Mellon University. This work is being done in
                 conjunction with INSTEP, Inc., a strategic development
                 firm located in Northern Virginia. The goal of the
                 thesis is to evaluate the Internet's pervasiveness in
                 the software industry, while creating a framework which
                 enables a software firm to strategically and
                 successfully increase its Internet presence. Towards
                 this end, we are distributing a questionnaire entitled
                 the Internet Agility/Maturity Model Survey for the
                 Software Industry. The Internet Agility/Maturity Model
                 (IAMM) survey elicits Internet usage trends with the
                 software industry in each of the following five areas:
                 * Background Information on Corporate Internet Use:
                 Queries regarding the initial Internet connectivity
                 planning and establishment phases. * Internet Presence
                 Management: Queries regarding resources committed to
                 on-going support and administration of the
                 corporation's Internet presence * Internet ROI /
                 Business Process Integration: Queries regarding which
                 functions use Internet services, the tools employed to
                 do so, and the value of an organization's presence in
                 terms of its ROI * Internet Utilization Issues: Queries
                 regarding future issues and current difficulties
                 pertaining to the corporation's Internet presence *
                 Agile Competitors and Virtual Organizations: Queries
                 regarding the knowledge of and the concepts
                 incorporated into the Iacocca Institute's agility
                 model. A summary of our findings will be submitted for
                 publication in a future issue of Software Engineering
                 Notes.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Raccoon:1996:LCP,
  author =       "L. B. S. Raccoon",
  title =        "A learning curve primer for software engineers",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "1",
  pages =        "77--86",
  day =          "1",
  month =        jan,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/381790.381805",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:06 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "I believe that many software engineers have heard of
                 learning curves. We know that new skills take time to
                 learn, that developers take a while to ramp up on a new
                 project, and that improvement slows as time goes on. I
                 also believe that we share many misconceptions about
                 learning curves. We don't assume that learning curves
                 are relevant to our software projects and we don't use
                 them in our processes. In this paper, I want to raise
                 the level of understanding of learning curves within
                 the Software Engineering community. This paper is for
                 managers and developers who want to better understand
                 learning curves. Learning curves are much more than a
                 hurdle to full productivity. They are both a metaphor
                 and a specific set of equations that describe the most
                 common patterns of improvement within stable processes.
                 Learning curves explain why the productivity of a
                 stable process changes the way that it does, why
                 productivity is lowest at the start of a project and
                 highest at the end of a project. Learning curves
                 explain that though the improvements diminish
                 throughout the process, the improvements continue
                 adding up. And, we can use learning curves to predict
                 future productivity. This paper is laid out as follows.
                 In the first section, I define learning curves,
                 describe their history, and argue that they apply to
                 Software Engineering. In the second section, I describe
                 the need to both stabilize and improve a process. Our
                 concept of process influences how we try to improve it,
                 so I discuss the implications of two different concepts
                 of process. Learning curves denote the relationship
                 between stability and improvement. In the third
                 section, I discuss the implications of learning curves
                 on staffing a project. Specifically, I show that
                 Brooks's observations about man-months can be explained
                 in terms of learning curves and that we need to keep
                 teams together on long-term projects. And in the fourth
                 section, I comment on several technical issues one
                 might encounter when applying learning curves to
                 software development. I describe the equations one
                 might use to model a process as well as the affect
                 learning curves typically have on software engineering
                 projects.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Veryard:1996:ICM,
  author =       "Richard Veryard",
  title =        "Information coordination --- the management of
                 information model, systems, and organizations",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "1",
  pages =        "87--89",
  day =          "1",
  month =        jan,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/381790.381806",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:06 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Burstler:1996:PLF,
  author =       "Jurgen Burstler",
  title =        "Pattern Languages o f Program Design",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "1",
  pages =        "88--89",
  day =          "1",
  month =        jan,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/381790.565679",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:06 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Finkbine:1996:MMS,
  author =       "Ronald B. Finkbine and Ph. D.",
  title =        "Metrics and Models in Software Quality Engineering",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "1",
  pages =        "89",
  day =          "1",
  month =        jan,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/381790.565681",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:06 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Poore:1996:HMP,
  author =       "Jesse H. Poore",
  title =        "{Harlan Mills}' Passing",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "2",
  pages =        "6",
  month =        mar,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/227531.773577",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:08 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Doernhoefer:1996:SNSa,
  author =       "Mark Doernhoefer",
  title =        "Surfing the net for {{\booktitle{Software Engineering
                 Notes}}}",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "2",
  pages =        "7--10",
  month =        mar,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/227531.227532",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:08 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Kitchenham:1996:ESEb,
  author =       "Barbara Ann Kitchenham",
  title =        "Evaluating software engineering methods and tool ---
                 part 2: selecting an appropriate evaluation method ---
                 technical criteria",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "2",
  pages =        "11--15",
  month =        mar,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/227531.227533",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:08 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "In the previous article about the DESMET evaluation
                 methodology, I identified nine different types of
                 evaluation:1. Quantitative Experiments2. Quantitative
                 Case Studies3. Quantitative Surveys4. Feature Analysis
                 --- Screening mode5. Feature Analysis --- Case Study6.
                 Feature Analysis --- Experiment7. Feature Analysis ---
                 Survey8. Qualitative Effects Analysis9. Benchmarking.
                 This article considers the way in which different
                 evaluation requirements and organisation capabilities
                 affect your choice of evaluation method. Your
                 particular choice of evaluation method will be affected
                 by your evaluation goals, the characteristics of the
                 object you want to evaluate, the characteristics of the
                 organisation you work in, and the limitations and
                 constraints placed on the evaluation exercise. These
                 different factors interact in complicated ways, so it
                 is difficult to identify which evaluation method is the
                 most appropriate. The specific criteria that the DESMET
                 methodology uses to determine your circumstances are:1.
                 The evaluation context.2. The nature of the expected
                 impact of using the method/tool.3. The nature of the
                 object (i.e., method/tool/generic method) to be
                 evaluated.4. The scope of impact of the method/tool.5.
                 The maturity of the method/tool.6. The learning curve
                 associated with the method/tool.7. The measurement
                 capability of the organisation undertaking the
                 evaluation. These issues are discussed in the following
                 sections.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Neumann:1996:RPCa,
  author =       "Peter G. Neumann",
  title =        "Risks to the public in computers and related systems",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "2",
  pages =        "16--22",
  month =        mar,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/227531.227534",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:08 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{McManus:1996:PMK,
  author =       "Joe McManus and Renaat Vergruggen",
  title =        "A proposed methodology for knowledge based systems
                 development",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "2",
  pages =        "22--31",
  month =        mar,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/227531.227535",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:08 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This paper proposes a new methodology for the
                 development of Knowledge Based Systems (KBS). The key
                 characteristics of knowledge based systems are
                 examined, with particular emphasis on those aspects of
                 developing such systems which differentiate them from
                 more conventional development approaches. Existing KBS
                 development methodologies are considered, and some of
                 the important aspects of these methodologies are
                 adopted/adapted within the new methodology, which seeks
                 to define a methodological approach which satisfies the
                 key requirements of knowledge-based systems
                 development, while ensuring that the key managerial
                 aspects of a methodological approach are also catered
                 for. The proposed methodology is then assessed in the
                 light of the particular difficulties of the paradigm
                 which it seeks to address.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Pillai:1996:FMI,
  author =       "Krish Pillai",
  title =        "The fountain model and its impact on project
                 schedule",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "2",
  pages =        "32--38",
  month =        mar,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/227531.227536",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:08 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "A software life-cycle is defined as ``[the activity
                 related to the software during] the period of time
                 beginning when the software product is conceived and
                 ending when the resultant software products are no
                 longer available for use [7].'' A software development
                 life-cycle can be broadly divided into phases, each
                 phase being characterized by a well-defined set of
                 activities associated with it. A model to represent
                 such a life-cycle helps team members define their tasks
                 more precisely. It helps managers track the project
                 schedule and aids verification of requirements
                 specification as the product evolves. Traditionally,
                 software development has been based on the
                 ``Waterfall'' model, shown in figure 1, or its
                 variations. There is a natural tendency among designers
                 to proceed in a highly sequential, linear, and
                 non-iterative manner. Designers tend to adhere to the
                 old adage ``Well begun is half done,'' by trying to
                 make the analysis and design of the product as complete
                 and precise as possible, before even embarking on its
                 implementation. Every iteration, if any, to refine the
                 design is viewed as an indicator of an insufficiency in
                 the design. Tampering with the original conceptual
                 design is discouraged, and though designers do iterate,
                 they do so with a feeling of ``guilt/incompetence.''
                 Conventionally, the different phases in a life-cycle
                 were classified as follows: * {\em Requirements
                 Definition and Analysis Phase} --- This phase is
                 characterized by review and analysis of a functional
                 document that describes the product. Requirements are
                 reviewed and analyzed and requirements based test-cases
                 are also generated at this stage. * {\em Design Phase}
                 --- Design drafts are reviewed and finalized. Test
                 cases for design integrity are also generated at this
                 stage. * {\em Implementation and Testing Phase} --- All
                 test cases are finalized. The implementation is tested,
                 first at the unit level, then following integration. *
                 {\em Installation Phase} --- The system is accepted for
                 release to customers during this phase. This may
                 involve some minimal final acceptance level testing. *
                 {\em Maintenance Phase} --- Regression testing,
                 software evaluations and specifications for evolving
                 the software are generated during this phase. The
                 waterfall model does not have a well defined method of
                 prototyping. It should be noted that a methodology such
                 as the one above, provides hardly any latitude for
                 iteration either. The stress is on refining the output
                 of each phase to the highest degree possible before the
                 commencement of the succeeding phase. Such an approach
                 may however, not prove feasible under certain
                 circumstances, especially when the product under
                 development is highly complex, and composed of several
                 agencies responsible for tasks of very high
                 specificity. The sheer complexity of the requirements
                 specification can obscure the underlying details so
                 much that, a precise and detailed design is rendered
                 impossible. Another instance is the case with products
                 that involve ``cutting-edge'' technology, where
                 research and development forms an integral part of the
                 developmental life-cycle. The problem with designing
                 ``state-of-the-art'' products is that, usually the most
                 efficient design isn't yet known at the analysis stage.
                 This necessitates an iterative approach to the
                 analysis, design, and implementation stages discernible
                 in a product's developmental life-cycle. However, the
                 necessity of an iterative approach to product
                 development requires basic building blocks that do not
                 undergo drastic mutation over iterations. This is an
                 issue of the choice of the ``Problem representation
                 domain'' in which the model life-cycle is to be
                 represented. The solution to this is to adopt an
                 object-oriented approach since objects are fairly
                 stable building blocks that can be identified at a very
                 early stage in the product life-cycle. In most cases,
                 the analysis, design, and implementation stages can all
                 be mapped into the object-oriented domain without
                 having to make disjoint mappings into the ``Structured
                 Analysis Domain'' [3]. And the ``Fountain model,''
                 employed with much success in object-oriented projects,
                 is ideally suited [5] for modeling such projects. A
                 problem that is seldom addressed in concerned
                 literature is the tendency for projects employing an
                 iterative paradigm to run behind schedule. This paper
                 investigates the most common causes of schedule
                 slippage in a typical project based on the fountain
                 model. Solutions that project team leaders adopt to
                 counter these causes are also mentioned. ``Constraint
                 mechanisms'' that are indicators of possible schedule
                 slippage, are also investigated.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Leite:1996:WRS,
  author =       "Julio Cesar Sampaio do Prado Leite",
  title =        "Working results on software re-engineering",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "2",
  pages =        "39--44",
  month =        mar,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/227531.227537",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:08 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "We view software re-engineering as a new approach to
                 software maintenance. Instead of performing maintenance
                 at the source code of systems, we work on high level
                 abstractions. From these abstractions we proceed in a
                 forward manner reusing the available implementations,
                 when it is the case. As such, we view re-engineering as
                 centered on design recovery. We have been working on
                 methods for re-engineering and applying them to real
                 cases. Our studies are centered on the idea of using
                 JSD [Jackson 83] as a way of casting the recovered
                 design. We worked with two small systems and a complex
                 one. Our objective here is to highlight our approach,
                 report on what has been done and point out what was
                 learned.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Shoemaker:1996:ESE,
  author =       "Dan Shoemaker and Vladan Jovanovic",
  title =        "Educating software executives: a doctorate in software
                 management",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "2",
  pages =        "45--46",
  month =        mar,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/227531.227538",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:08 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This presents a model that integrates ``best theory
                 and practice'' into a doctoral program focused on the
                 development of leaders for the software industry. The
                 advantage of a study centered on improvement of the
                 software process should be intuitively obvious. This
                 provides an overview, a model, and a course array.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Bernstein:1996:SIS,
  author =       "Lawrence Bernstein",
  title =        "Software investment strategy",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "2",
  pages =        "47--53",
  month =        mar,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/227531.227539",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:08 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Kokol:1996:TQO,
  author =       "Peter Kokol",
  title =        "Toward quality oriented {IS} design processes using
                 two levelled design",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "2",
  pages =        "53--55",
  month =        mar,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/227531.227540",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:08 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The quality of information systems (IS) is strongly
                 related with the quality of the IS design process and
                 both are fundamental issues in successful IS
                 construction and use process. In the paper we present a
                 two-levelled IS design approach aimed to result in both
                 quality oriented information system design processes
                 and quality information systems.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{George:1996:SMF,
  author =       "Joseph George and Bradley D. Carter",
  title =        "A strategy for mapping from function-oriented software
                 models to object-oriented software models",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "2",
  pages =        "56--63",
  month =        mar,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/227531.227541",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:08 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Because of being in transition or because of choice,
                 many software development environments make use of both
                 the function-oriented and object-oriented approaches in
                 their software development process. In some cases,
                 object-oriented and function-oriented approaches are
                 used in the development of the same system, such as
                 when using function-oriented analysis with
                 object-oriented design, necessitating a transition or
                 mapping from one model to the other. This paper reviews
                 the issues involved in mapping from a function-oriented
                 software model to an object-oriented software model and
                 presents a strategy for accomplishing the mapping in a
                 consistent and partially automatable manner. The
                 effectiveness of the strategy is assessed with four
                 different applications drawn from the literature. It is
                 concluded that the mapping strategy is feasible and
                 reasonably automatable.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Johnson:1996:SES,
  author =       "D. M. Johnson",
  title =        "The systems engineer and the software crisis",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "2",
  pages =        "64--73",
  month =        mar,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/227531.227542",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:08 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This report examines the software crisis from a
                 systems engineer's viewpoint. It analyses the key areas
                 of requirements specification, verification and
                 validation and software re-use. It assesses some of the
                 solutions to the crisis proposed by the software
                 engineering community and highlights some of their
                 problems and limitations from the systems engineer's
                 perspective. The report describes how, through the use
                 of computer-aided symbolic specification techniques and
                 simulation, and with an understanding of the software
                 development process, the skilled systems engineer can
                 contribute to the resolution of the software crisis.
                 The skilled systems engineer, can through the use of
                 these techniques and by the application of systems
                 engineering methods and project management skills,
                 reduce the demands placed on software engineers, hence
                 reducing the software engineering effort and also
                 reducing the total development cost.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Kelsey:1996:BFC,
  author =       "Robert Bruce Kelsey",
  title =        "Bad fixes, change specifications, and linguistic
                 constraints on problem diagnosis",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "2",
  pages =        "74--78",
  month =        mar,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/227531.227543",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:08 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Analyzing, diagnosing, and proposing fixes to problems
                 in complex software is essentially a linguistic
                 activity: we think in languages such as C and English,
                 we analyze written problem reports, we read listings.
                 In cognitive psychology and interpretation theory, the
                 linguistic constraints upon cognition are well
                 established; but with the exception of those authors
                 working within the field of Speech Act Theory, little
                 has been said about how these constraints affect
                 software problem diagnosis or what we can do to
                 overcome these constraints. This paper examines some of
                 the linguistic aspects of software problem analysis,
                 showing how these may contribute to the bad fix, and
                 then describes a change specification procedure
                 specifically designed to help development teams
                 overcome some of the liabilities of interpreting
                 complex software failures.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Swartz:1996:AAB,
  author =       "A. John Swartz",
  title =        "{Airport 95}: automated baggage system?",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "2",
  pages =        "79--83",
  month =        mar,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/227531.227544",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:08 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The Denver International Airport automated baggage
                 system was a major news story spanning the years
                 1994-95. Reconstruction of the events of the project
                 management of this system serves as an example of
                 project summary reporting, which is stipulated in every
                 project management methodology, but which is seldom or
                 never done. The author provides sufficient detail to
                 enable simulation of the design approach alternatives.
                 If other projects are reported in the same format, it
                 will be possible to compare projects on a design phase
                 and/or event-by-event basis. The author recommends
                 establishment and maintenance of a knowledge base of
                 specific causes for failed software development
                 projects.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Pitts:1996:WWR,
  author =       "David R. Pitts and Barbara H. Miller",
  title =        "The wild-west revisited",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "2",
  pages =        "84--86",
  month =        mar,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/227531.227545",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:08 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "In 1985 Mark Spinrad and Curt Abraham published; ``
                 The Wild West Lifecycle (WILI) '' [1] which, although
                 written with a slightly irreverent tongue-in-cheek
                 style, introduced a significant metaphor for the
                 software engineering lifecycle. In this paper we will
                 discuss briefly the importance of software metaphors in
                 general, and then revisit and expand the Wild West
                 analogy.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Rine:1996:SDO,
  author =       "David Rine",
  title =        "Structural defects in object-oriented programming",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "2",
  pages =        "86--88",
  month =        mar,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/227531.227546",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:08 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Garcia:1996:PM,
  author =       "Manuel J. Barranco Garc{\'\i}a and Juan Carlos Granja
                 Alvarez",
  title =        "Productive maintainability",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "2",
  pages =        "89--91",
  month =        mar,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/227531.227547",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:08 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "It is obvious the existence of a powerful connection
                 between quality and productivity in the software
                 projects. Normally, an increase of quality bring to a
                 greater productivity. Maintainability is a very
                 important factor of quality, considering the enormous
                 consumption of resources that is carried out during the
                 maintenance stage. We comment in this article the
                 relation between maintainability and productivity, and
                 when the maintainability result productive and when
                 not.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Ayers:1996:BRI,
  author =       "Michael Ayers",
  title =        "Book Review: {{\booktitle{Information Modeling --- An
                 Object-Oriented Approach}} by Haim Kilov and James
                 Ross}",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "2",
  pages =        "91--92",
  month =        mar,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/227531.773578",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:08 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Leciston:1996:BRP,
  author =       "David John Leciston",
  title =        "Book Review: {{\booktitle{PCTE: The Standard for Open
                 Repositories}} by Lois Wakeman and Jonathan Jowett}",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "2",
  pages =        "92",
  month =        mar,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/227531.773579",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:08 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Tracz:1996:TAS,
  author =       "Will Tracz",
  title =        "Test and analysis of software architectures",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "3",
  pages =        "1--3",
  month =        may,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/226295.226296",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:10 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Some DoD programs now require prospective contractors
                 to demonstrate the superiority of their software
                 architectures for new weapons systems. This acquisition
                 policy provides new software engineering challenges
                 that focus heavily on the test and analysis of software
                 architectures in order to determine the ``best''
                 architecture in terms of its implementability,
                 affordability, extendability, scalability,
                 adaptability, and maintainability --- not overlooking
                 whether or not it will meet the functional requirements
                 of the system.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Kang:1996:ESS,
  author =       "Inhye Kang and Insup Lee",
  title =        "An efficient state space generation for analysis of
                 real-time systems",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "3",
  pages =        "4--13",
  month =        may,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/226295.226297",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:10 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "State explosion is a well-known problem that impedes
                 analysis and testing based on state-space exploration.
                 This problem is particularly serious in real-time
                 systems because unbounded time values cause the state
                 space to be infinite. In this paper, we present an
                 algorithm that produces a compact representation of
                 reachable state space of a real-time system. The
                 algorithm yields a small state space, but still retains
                 enough timing information for analysis. To avoid the
                 state explosion which can be caused by simply adding
                 time values to states, our algorithm first uses history
                 equivalence and transition bisimulation to collapse
                 states into equivalent classes. In this approach,
                 equivalent states have identical observable events
                 although transitions into the states may happen at
                 different times. The algorithm then augments the
                 resultant state space with timing relations that
                 describe time distances between transition executions.
                 For example, the relation @(tr 1) + 3 \leq @(tr 2) \leq
                 @(tr 1) + 5 means that transition tr 2 is taken 3 to 5
                 time units before transition tr 2 is taken. This is
                 used to analyze timing properties such as minimum and
                 maximum time distances between events. To show the
                 effectiveness of our algorithm, we have implemented the
                 algorithm and are currently comparing it to other
                 existing techniques which generate state space for
                 real-time systems.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Koppol:1996:IAS,
  author =       "Pramod V. Koppol and Kuo-Chung Tai",
  title =        "An incremental approach to structural testing of
                 concurrent software",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "3",
  pages =        "14--23",
  month =        may,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/226295.226298",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:10 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Structural testing of a concurrent program P involves
                 the selection of paths of P according to a
                 structure-based criterion. A common approach is to
                 derive the reachability graph (RG) of P, select a set
                 of paths of P, derive one or more inputs for each
                 selected path, and force deterministic executions of P
                 according to the selected paths and their inputs. The
                 use of RG(P) for test path selection has the state
                 explosion problem, since the number of states of RG(P)
                 is an exponential function of the number of processes
                 in P. In this paper, we present a new incremental
                 approach to structural testing of P. Based on the
                 hierarchy of processes in P, our incremental testing
                 approach is to integrate processes in P in a
                 bottom-to-top manner. When a set S of processes in P at
                 the same level are integrated, we construct a reduced
                 RG for S such that the reduced RG contains all
                 synchronizations involving the processes in S and some
                 of the synchronizations involving processes at lower
                 levels in order to connect synchronizations involving
                 processes in S. Based on the reduced RG for S, we can
                 select test paths to focus on the detection of
                 interface faults involving processes in S. After the
                 selection of paths, RG(S) is further reduced in order
                 to retain only some of the synchronizations involving
                 processes in S that are needed in order to connect
                 synchronizations between S and other processes in P.
                 Our incremental approach alleviates the state explosion
                 problem and offers other advantages.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Chamillard:1996:IAP,
  author =       "A. T. Chamillard and Lori A. Clarke",
  title =        "Improving the accuracy of {Petri} net-based analysis
                 of concurrent programs",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "3",
  pages =        "24--38",
  month =        may,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/226295.226299",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:10 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Spurious results are an inherent problem of most
                 static analysis methods. These methods, in an effort to
                 produce conservative results, overestimate the
                 executable behavior of a program. Infeasible paths and
                 imprecise alias resolution are the two causes of such
                 inaccuracies. In this paper we present an approach for
                 improving the accuracy of Petri net-based analysis of
                 concurrent programs by including additional program
                 state information in the Petri net. We present
                 empirical results that demonstrate the improvements in
                 accuracy and, in some cases, the reduction in the
                 search space that result from applying this approach to
                 concurrent Ada programs.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Morasca:1996:GFT,
  author =       "Sandro Morasca and Angelo Morzenti and Pieluigi
                 SanPietro",
  title =        "Generating functional test cases in-the-large for
                 time-critical systems from logic-based specifications",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "3",
  pages =        "39--52",
  month =        may,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/226295.226300",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:10 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "We address the problem of generating functional test
                 cases for complex, highly structured time-critical
                 systems starting from a modularized logic-based
                 specification written in the TRIOR$^+$ language, an
                 object-oriented extension of the temporal logic TRIO.
                 First, we present methods for producing test cases for
                 a TRIO$^+$ specification module, referring both to the
                 internal, hidden, portion of the module and to its
                 interface. Then, we discuss criteria to be used in the
                 construction of test cases from a TRIO$^+$
                 specification based on its composing modules and the
                 connections among their interfaces. We formally define
                 the notions related to test case derivation from
                 TRIO$^+$ modules and we introduce an executable
                 language for describing a variety of strategies for
                 constructing test cases for structured TRIO$^+$
                 specifications starting from (parts of) the test cases
                 of the composing modules. This language can be the
                 basis for the implementation of an interactive tool for
                 the semiautomatic construction of functional test cases
                 from complex time-critical systems starting from their
                 TRIO$^+$ specification.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Hughes:1996:DSA,
  author =       "Merlin Hughes and David Stotts",
  title =        "{Daistish}: systematic algebraic testing for {OO}
                 programs in the presence of side-effects",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "3",
  pages =        "53--61",
  month =        may,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/226295.226301",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:10 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Daistish is a tool that performs systematic algebraic
                 testing similar to Gannon's DAISTS tool [2]. However,
                 Daistish creates effective test drivers for programs in
                 languages that use side effects to implement ADTs; this
                 includes C++ and most other object-oriented languages.
                 The functional approach of DAISTS does not apply
                 directly in these cases. The approach in our work is
                 most similar to the ASTOOT system of Doong and Frankl
                 [1]; Daistish differs from ASTOOT by using Guttag-style
                 algebraic specs (functional notation), by allowing
                 aliasing of type names to tailor the application of
                 parameters in test cases, and by retaining the
                 abilities of DAISTS to compose new test points from
                 existing ones. Daistish is a Perl script, and is
                 compact and practical to apply. We describe the
                 implementation and our experiments in both Eiffel and
                 C++. Our work has concentrated on solving the
                 semantics-specific issues of correctly duplicating
                 objects for comparison; we have not worked on methods
                 for selecting specific test cases. Daistish consists of
                 a perl script and supporting documentation. The current
                 distribution can be obtained via WWW at URL
                 http://www.cs.unc.edu/~stotts/Daistish/.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Chang:1996:SSB,
  author =       "Juei Chang and Debra J. Richardson and Sriram Sankar",
  title =        "Structural specification-based testing with {ADL}",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "3",
  pages =        "62--70",
  month =        may,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/226295.226302",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:10 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This paper describes a specification-based black-box
                 technique for testing program units. The main
                 contribution is the method that we have developed to
                 derive test conditions, which are descriptions of test
                 cases, from the formal specification of each program
                 unit. The derived test conditions are used to guide
                 test selection and to measure comprehensiveness of
                 existing test suites. Our technique complements
                 traditional code-based techniques such as statement
                 coverage and branch coverage. It allows the tester to
                 quickly develop a black-box test suite. In particular,
                 this paper presents techniques for deriving test
                 conditions from specifications written in the Assertion
                 Definition Language (ADL) [SH94], a predicate
                 logic-based language that is used to describe the
                 relationships between inputs and outputs of a program
                 unit. Our technique is fully automatable, and we are
                 currently implementing a tool based on the techniques
                 presented in this paper.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Crowley:1996:IFS,
  author =       "J. L. Crowley and J. F. Leathrum and K. A. Liburdy",
  title =        "Issues in the full scale use of formal methods for
                 automated testing",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "3",
  pages =        "71--78",
  month =        may,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/226295.226303",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:10 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Experience from a full scale effort to apply formal
                 methods to automated testing in the open systems
                 software arena is described. The formal method applied
                 in this work is based upon the Clemson Automated
                 Testing System (CATS) which includes a formal
                 specification language, a set of guidelines describing
                 how to use the method effectively, and tool support
                 capable of translating formal specifications into
                 executable tests. This method is currently being used
                 to develop a full scale test suite for IEEE's Ada
                 Language Binding to POSIX. Following an overview of
                 CATS, an experience report consisting of results,
                 lessons learned and future directions is presented.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Heimdahl:1996:ELA,
  author =       "Mats P. E. Heimdahl",
  title =        "Experiences and lessons from the analysis of {TCAS
                 II}",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "3",
  pages =        "79--83",
  month =        may,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/226295.226304",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:10 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This report highlights some of the experiences
                 gathered while analyzing the requirements specification
                 for a commercial avionics system called TCAS II
                 (Traffic alert and Collision Avoidance System II) for
                 consistency and completeness. Completeness in this
                 context is defined as a complete set of requirements,
                 that is, there is a behavior specified for every
                 possible input and input sequence. Under the leadership
                 of Dr. Nancy G. Leveson, the Irvine Safety Research
                 Group has developed a state-based requirements
                 specification language RSML (Requirements State Machine
                 Language) using TCAS II as a testbed [6]. The TCAS
                 requirements specification project was very successful;
                 RSML was well liked by all participants in the project,
                 and the formal specification has been adopted as the
                 official TCAS II requirements. The requirements
                 document has been delivered to the FAA and has
                 undergone an extensive independent validation and
                 verification effort (IV\&V). In a previous
                 investigation, we defined procedures for analyzing
                 state-based requirements specifications for
                 completeness and consistency [5]. To demonstrate that
                 our approach is feasible and is applicable to realistic
                 systems, we have implemented a draft analysis tool and
                 we have applied the analysis to the TCAS II
                 requirements. The initial results from the analysis
                 effort were encouraging [4, 5] and scaled well to a
                 large requirements specification. The most complex
                 parts of the TCAS requirements specification have
                 recently been analyzed. Even though the effort was
                 largely successful, some limitations with the approach
                 have surfaced. Most importantly, the accuracy of the
                 analysis algorithms needs improvement. When analyzing
                 the most complex parts of the TCAS requirements, the
                 number of spurious error reports can occasionally be
                 overwhelming. Furthermore, we discovered that once the
                 analysis has identified problems, it has been
                 unexpectedly difficult to correct some of them.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Hamlet:1996:PDT,
  author =       "Dick Hamlet",
  title =        "Predicting dependability by testing",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "3",
  pages =        "84--91",
  month =        may,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/226295.226305",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:10 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "In assessing the quality of software, we would like to
                 make engineering judgements similar to those based on
                 statistical quality control. Ideally, we want to
                 support statements like: ``The confidence that this
                 program's result at X is correct is p, '' where X is a
                 particular vector of inputs, and confidence p is
                 obtained from measurements of the software (perhaps
                 involving X). For the theory to be useful, it must be
                 feasible to predict values of p near 1 for many
                 programs, for most values of X. Blum's theory of
                 self-checking/correcting programs has exactly the right
                 character, but it applies to only a few unusual
                 problems. Conventional software reliability theory is
                 widely applicable, but it yields only confidence in a
                 failure intensity, and the measurements required to
                 support a correctness-like failure intensity (say
                 10$^{-9}$ /demand) are infeasible. Voas's sensitivity
                 theory remedies these problems of reliability theory,
                 but his model is too simple to be very plausible. In
                 this paper we combine these ideas: reliability,
                 sensitivity, and self-checking, to obtain new results
                 on ``dependability,'' plausible predictions of software
                 quality.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Morell:1996:UPA,
  author =       "Larry Morell and Branson Murrill",
  title =        "Using perturbation analysis to measure variation in
                 the information content of test sets",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "3",
  pages =        "92--97",
  month =        may,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/226295.226306",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:10 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "We define the information content of test set T with
                 respect to a program P to be the degree to which the
                 behavior of P on T approximates the overall behavior of
                 P. Informally, the higher the information content of a
                 test set, the greater the likelihood an error in the
                 data state of a program will be manifested under
                 testing. Perturbation analysis injects errors into the
                 data state of an executing program and traces the
                 impact of those errors on the intervening states and
                 the program's output. The injection is performed by
                 perturbation functions that randomly change the
                 program's data state. Using perturbation analysis we
                 demonstrate that different test sets may satisfy the
                 same testing criterion but have significantly different
                 information content. We believe that ``consistency of
                 information content'' is a crucial measure of the
                 quality of a testing strategy. We show how perturbation
                 analysis may be used to assess individual testing
                 strategies and to compare different testing strategies.
                 The ``coupling effect'' of mutation testing implies
                 that there is little variation among mutation-adequate
                 test sets for a program. This implication is
                 investigated for two simple programs by analyzing the
                 variation among several mutation-adequate test sets.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Howden:1996:LSE,
  author =       "W. E. Howden and G. M. Shi",
  title =        "Linear and structural event sequence analysis",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "3",
  pages =        "98--106",
  month =        may,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/226295.226307",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:10 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "An approach to systematic informal program analysis is
                 discussed in which comments that describe hypotheses
                 and assertions about the behavior of programs are
                 analyzed. Event sequence comments analysis methods
                 analyze the consistency of comments that describe
                 events. Two event sequence analysis methods are
                 discussed, one of which uses a linear event sequence
                 model, and which has been applied to the analysis of
                 large data processing systems. The other uses a new
                 approach involving rule-based structural models, and
                 has been applied to the analysis of Ada programs.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Harrold:1996:SCA,
  author =       "Mary Jean Harrold and Gregg Rothermel",
  title =        "Separate computation of alias information for reuse",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "3",
  pages =        "107--120",
  month =        may,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/226295.309037",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:10 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Interprocedural dataflow information is useful for
                 many software testing and analysis techniques,
                 including dataflow testing, regression testing, program
                 slicing and impact analysis. For programs with aliases,
                 these testing and analysis techniques can yield invalid
                 results, unless the dataflow information accounts for
                 aliasing effects. Recent research provides algorithms
                 for performing interprocedural dataflow analysis in the
                 presence of aliases; however, these algorithms are
                 expensive, and achieve precise results only on complete
                 programs. This paper presents an algorithm for
                 performing alias analysis on incomplete programs, that
                 lets individual software components such as library
                 routines, subroutines, or subsystems be independently
                 analyzed. The paper also presents an algorithm for
                 reusing the results of this separate analysis when
                 linking the individual software components with calling
                 modules. The primary advantage of our algorithms is
                 that they let us analyze frequently used software
                 components, such as library routines or classes,
                 independently, and reuse the results of that analysis
                 when analyzing calling programs, without incurring the
                 expense of completely reanalyzing each calling
                 program.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{DeMillo:1996:CSS,
  author =       "Richard A. DeMillo and Hsin Pan and Eugene H.
                 Spafford",
  title =        "Critical slicing for software fault localization",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "3",
  pages =        "121--134",
  month =        may,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/226295.226310",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:10 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Developing effective debugging strategies to guarantee
                 the reliability of software is important. By analyzing
                 the debugging process used by experienced programmers,
                 we have found that four distinct tasks are consistently
                 performed: (1) determining statements involved in
                 program failures, (2) selecting suspicious statements
                 that might contain faults, (3) making hypotheses about
                 suspicious faults (variables and locations), and (4)
                 restoring program state to a specific statement for
                 verification. This research focuses support for the
                 second task, reducing the search domain for faults,
                 which we refer to as fault localization. We explored a
                 new approach to enhancing the process of fault
                 localization based on dynamic program slicing and
                 mutation-based testing. In this new approach, we have
                 developed the technique of Critical Slicing to enable
                 debuggers to highlight suspicious statements and thus
                 to confine the search domain to a small region. The
                 Critical Slicing technique is partly based on
                 ``statement deletion'' mutant operator of the
                 mutation-based testing methodology. We have explored
                 properties of Critical Slicing, such as the
                 relationship among Critical Slicing, Dynamic Program
                 Slicing, and Executable Static Program Slicing; the
                 cost to construct critical slices; and the
                 effectiveness of Critical Slicing. Results of
                 experiments support our conjecture as to the
                 effectiveness and feasibility of using Critical Slicing
                 for fault localization. This paper explains our
                 technique and summarizes some of our findings. From
                 these, we conclude that a debugger equipped with our
                 proposed fault localization method can reduce human
                 interaction time significantly and aid in the debugging
                 of complex software.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Marx:1996:PWA,
  author =       "Delia I. S. Marx and Phyllis G. Frankl",
  title =        "The path-wise approach to data flow testing with
                 pointer variables",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "3",
  pages =        "135--146",
  month =        may,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/226295.226311",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:10 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This paper describes a new approach to performing data
                 flow testing on programs that use pointer variables and
                 a tool based on this approach. Our technique is based
                 on the observation that, under certain reasonable
                 assumptions, we can determine which dereferenced
                 pointers are aliased whenever control reaches a given
                 program point via a particular path. Furthermore, we
                 can group together paths which behave similarly and
                 represent them by regular expressions. The resulting
                 test requirements demand that the test data execute
                 representatives of particular sets of paths between
                 variable definitions and uses.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Marre:1996:UDT,
  author =       "Martina Marr{\'e} and Antonia Bertolino",
  title =        "Unconstrained duals and their use in achieving
                 all-uses coverage",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "3",
  pages =        "147--157",
  month =        may,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/226295.226312",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:10 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Testing takes a considerable amount of the time and
                 resources spent on producing software. It would
                 therefore be useful to have ways (1) to reduce the cost
                 of testing and (2) to estimate this cost. In
                 particular, the number of tests to be executed is an
                 important and useful attribute of the entity ``testing
                 effort''. All-uses coverage is a data flow testing
                 strategy widely researched in recent years. In this
                 paper we present spanning sets of duas for the all-uses
                 coverage criterion. A spanning set of duas is a minimum
                 set of duas (definition-use associations) such that a
                 set of test paths covering them covers every dua in the
                 program. We give a method to find a spanning set of
                 duas using the relation of subsumption between duas.
                 Intuitively, there exists a natural ordering between
                 the duas in a program: some duas are covered more
                 easily than others, since coverage of the former is
                 automatically guaranteed whenever the latter are
                 covered. Those duas that are the most difficult to be
                 covered according to this ordering are called
                 unconstrained. A spanning set of duas is composed of
                 unconstrained duas. Our results are useful for reducing
                 the cost of testing, since the generation of test paths
                 can be targeted to cover the smaller spanning set of
                 duas, rather than all those in a program. On the other
                 hand, assuming that a different path is taken to cover
                 each dua in a spanning set, the cardinality of spanning
                 sets can be used to estimate the cost of testing. Other
                 interesting uses of spanning sets of duas are also
                 discussed.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Daran:1996:SEA,
  author =       "Murial Daran and Pascale Th{\'e}venod-Fosse",
  title =        "Software error analysis: a real case study involving
                 real faults and mutations",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "3",
  pages =        "158--171",
  month =        may,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/226295.226313",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:10 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The paper reports on a first experimental comparison
                 of software errors generated by real faults and by
                 1st-order mutations. The experiments were conducted on
                 a program developed by a student from the industrial
                 specification of a critical software from the civil
                 nuclear field. Emphasis was put on the analysis of
                 errors produced upon activation of 12 real faults by
                 focusing on the mechanisms of error creation, masking,
                 and propagation up to failure occurrence, and on the
                 comparison of these errors with those created by 24
                 mutations. The results involve a total of 3730 errors
                 recorded from program execution traces: 1458 errors
                 were produced by the real faults, and the 2272 others
                 by the mutations. They are in favor of a suitable
                 consistency between errors generated by mutations and
                 by real faults: 85\% of the 2272 errors due to the
                 mutations were also produced by the real faults.
                 Moreover, it was observed that although the studied
                 mutations were simple faults, they can create erroneous
                 behaviors as complex as those identified for the real
                 faults. This lends support to the representativeness of
                 errors due to mutations.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Pezze:1996:GMF,
  author =       "Mauro Pezz{\`e} and Michal Young",
  title =        "Generation of multi-formalism state-space analysis
                 tools",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "3",
  pages =        "172--179",
  month =        may,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/226295.226314",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:10 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "As software evolves from early architectural sketches
                 to final code, a variety of representations are
                 appropriate. Moreover, at most points in development,
                 different portions of a software system are at
                 different stages in development, and consequently in
                 different representations. State-space analysis
                 techniques (reachability analysis, model checking,
                 simulation, etc.) have been developed for several
                 representations of concurrent systems, but each tool or
                 technique has typically been targeted to a single
                 design or program notation. We describe an approach to
                 constructing space analysis tools using a core set of
                 basic representations and components. Such a tool
                 generation approach differs from translation to a
                 common formalism. We need not map every supported
                 design formalism to a single internal form that
                 completely captures the original semantics; rather, a
                 shared ``inframodel'' represents only the essential
                 information for interpretation by tool components that
                 can be customized to reflect the semantics of each
                 formalism. This results in more natural and compact
                 internal representations, and more efficient analysis,
                 than a purely translational approach. We illustrate the
                 approach by applying the prototype tool to a small
                 example problem, coordination of access to a coffee
                 machine. The coffee machine is controlled by an Ada
                 program, and the protocol of human users is modeled
                 with Petri nets. Nets and process graph models are
                 represented in the common internal form, and their
                 composite behavior is analyzed by the prototype tool.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Sloane:1996:BTP,
  author =       "Anthony M. Sloane and Jason Holdsworth",
  title =        "Beyond traditional program slicing",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "3",
  pages =        "180--186",
  month =        may,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/226295.226315",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:10 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Traditional program slices are based on variables and
                 statements. Slices consist of statements that
                 potentially affect (or are affected by) the value of a
                 particular variable at a given statement. Two
                 assumptions are implicit in this definition: (1) that
                 variables and statements are concepts of the
                 programming language in which the program is written,
                 and (2) that slices consist solely of statements.
                 Generalised slicing is an extension of traditional
                 slicing where variables are replaced by arbitrary named
                 program entities and statements by arbitrary program
                 constructs. A model of generalised slicing is presented
                 that allows the essence of any slicing tool to be
                 reduced to a node marking process operating on a
                 program syntax tree. Slicing tools can thus be
                 implemented in a straight-forward way using tree-based
                 techniques such as attribute grammars.A variety of
                 useful program decompositions are shown to be instances
                 of generalised slicing including: call graph
                 generation, interface extraction, slicing of
                 object-oriented inheritance hierarchies and slices
                 based on type dependences. Examples are also given of
                 how slicing can enhance understanding of formal
                 compiler specifications and aid the creation of subset
                 language specifications.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Callahan:1996:AVV,
  author =       "John R. Callahan and Todd L. Montgomery",
  title =        "An approach to verification and validation of a
                 reliable multicasting protocol",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "3",
  pages =        "187--194",
  month =        may,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/226295.226316",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:10 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This paper describes the process of implementing a
                 complex communications protocol that provides reliable
                 delivery of data in multicast-capable, packet-switching
                 telecommunication networks. The protocol, called the
                 Reliable Multicasting Protocol (RMP), was developed
                 incrementally using a combination of formal and
                 informal techniques in an attempt to ensure the
                 correctness of its implementation. Our development
                 process involved three concurrent activities: (1) the
                 initial construction and incremental enhancement of a
                 formal state model of the protocol machine; (2) the
                 initial coding and incremental enhancement of the
                 implementation; and (3) model-based testing of
                 iterative implementations of the protocol. These
                 activities were carried out by two separate teams: a
                 design team and a V\&V team. The design team built the
                 first version of RMP with limited functionality to
                 handle only nominal requirements of data delivery. In a
                 series of iterative steps, the design team added new
                 functionality to the implementation while the V\&V team
                 kept the state model in fidelity with the
                 implementation. This was done by generating test cases
                 based on suspected errant or off-nominal behaviors
                 predicted by the current model. If the execution of a
                 test was different between the model and
                 implementation, then the differences helped identify
                 inconsistencies between the model and implementation.
                 The dialogue between both teams drove the co-evolution
                 of the model and implementation. Testing served as the
                 vehicle for keeping the model and implementation in
                 fidelity with each other. This paper describes (1) our
                 experiences in developing our process model; and (2)
                 three example problems found during the development of
                 RMP.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Offutt:1996:SMP,
  author =       "A. Jefferson Offutt and J. Huffman Hayes",
  title =        "A semantic model of program faults",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "3",
  pages =        "195--200",
  month =        may,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/226295.226317",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:10 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Program faults are artifacts that are widely studied,
                 but there are many aspects of faults that we still do
                 not understand. In addition to the simple fact that one
                 important goal during testing is to cause failures and
                 thereby detect faults, a full understanding of the
                 characteristics of faults is crucial to several
                 research areas in testing. These include fault-based
                 testing, testability, mutation testing, and the
                 comparative evaluation of testing strategies. In this
                 workshop paper, we explore the fundamental nature of
                 faults by looking at the differences between a
                 syntactic and semantic characterization of faults. We
                 offer definitions of these characteristics and explore
                 the differentiation. Specifically, we discuss the
                 concept of ``size'' of program faults --- the
                 measurement of size provides interesting and useful
                 distinctions between the syntactic and semantic
                 characterization of faults. We use the fault size
                 observations to make several predictions about testing
                 and present preliminary data that supports this model.
                 We also use the model to offer explanations about
                 several questions that have intrigued testing
                 researchers.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Yang:1996:TSL,
  author =       "Cheer-Sun D. Yang and Lori L. Pollock",
  title =        "Towards a structural load testing tool",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "3",
  pages =        "201--208",
  month =        may,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/226295.226318",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:10 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Load sensitive faults cause a program to fail when it
                 is executed under a heavy load or over a long period of
                 time, but may have no detrimental effect under small
                 loads or short executions. In addition to testing the
                 functionality of these programs, testing how well they
                 perform under stress is very important. Current
                 approaches to stress, or load, testing treat the system
                 as a black box, generating test data based on
                 parameters specified by the tester within an
                 operational profile. In this paper, we advocate a
                 structural approach to load testing. There exist many
                 structural testing methods; however, their main goal is
                 generating test data for executing all statements,
                 branches, definition-use pairs, or paths of a program
                 at least once, without consideration for executing any
                 particular path extensively. Our initial work has
                 focused on the identification of potentially load
                 sensitive modules based on a static analysis of the
                 module's code, and then limiting the stress testing to
                 the regions of the modules that could be the potential
                 causes of the load sensitivity. This analysis will be
                 incorporated into a testing tool for structural load
                 testing which takes a program as input, and
                 automatically determines whether that program needs to
                 be load tested, and if so, automatically generates test
                 data for structural load testing of the program.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Korel:1996:ATD,
  author =       "Bogdan Korel",
  title =        "Automated test data generation for programs with
                 procedures",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "3",
  pages =        "209--215",
  month =        may,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/226295.226319",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:10 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Test data generation in program testing is the process
                 of identifying a set of test data that satisfies a
                 selected testing criterion, such as, statement coverage
                 or branch coverage. The existing methods of test data
                 generation are limited to unit testing and may not
                 efficiently generate test data for programs with
                 procedures. In this paper we present an approach for
                 automated test data generation for programs with
                 procedures. This approach builds on the current theory
                 of execution-oriented test data generation. In this
                 approach, test data are derived based on the actual
                 execution of the program under test. For many programs,
                 the execution of the selected statement may require
                 prior execution of some other statements that may be
                 part of some procedures. The existing methods use only
                 control flow information of a program during the search
                 process and may not efficiently generate test data for
                 these types of programs because they are not able to
                 identify statements that affect execution of the
                 selected statement. Our approach uses data dependence
                 analysis to guide the process of test data generation.
                 Data dependence analysis automatically identifies
                 statements (or procedures) that affect the execution of
                 the selected statement and this information is used to
                 guide the search process. The initial experiments have
                 shown that this approach may improve the chances of
                 finding test data.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Pomakis:1996:RAF,
  author =       "Keith P. Pomakis and Joanne M. Atlee",
  title =        "Reachability analysis of feature interactions: a
                 progress report",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "3",
  pages =        "216--223",
  month =        may,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/226295.226320",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:10 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Features are added to an existing system to add
                 functionality. A new feature interacts with an existing
                 feature if the behavior of the existing feature is
                 changed by the presence of the new feature. Our
                 research group has started to investigate how to detect
                 feature interactions during the requirements phase of
                 feature development. We have adopted a layered
                 state-transition machine model that prioritizes
                 features and avoids interactions due to
                 non-determinism. We have a tabular notation for
                 specifying behavioral requirements of services and
                 features. Specifications are composed into a
                 reachability graph, and the graph is searched for
                 feature interactions. This paper demonstrates how
                 reachability analysis has been used to automatically
                 detect known control interactions, data interactions,
                 and resource contentions among telephony features.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Bultan:1996:CVM,
  author =       "Tevfik Bultan and Jeffrey Fischer and Richard Gerber",
  title =        "Compositional verification by model checking for
                 counter-examples",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "3",
  pages =        "224--238",
  month =        may,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/226295.226321",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:10 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Many concurrent systems are required to maintain
                 certain safety and liveness properties. One emerging
                 method of achieving confidence in such systems is to
                 statically verify them using model checking. In this
                 approach an abstract, finite-state model of the system
                 is constructed; then an automatic check is made to
                 ensure that the requirements are satisfied by the
                 model. In practice, however, this method is limited by
                 the state space explosion problem. We have developed a
                 compositional method that directly addresses this
                 problem in the context of multi-tasking programs. Our
                 solution depends on three key space-saving ingredients:
                 (1) checking for counter-examples, which leads to
                 simpler search algorithms; (2) automatic extraction of
                 interfaces, which allows a refinement of the finite
                 model --- even before its communicating partners have
                 been compiled; and (3) using propositional
                 ``strengthening assertions'' for the sole purpose of
                 reducing state space. In this paper we present our
                 compositional approach, and describe the software tools
                 that support it.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Jackson:1996:ESA,
  author =       "Daniel Jackson and Craig A. Damon",
  title =        "Elements of style: analyzing a software design feature
                 with a counterexample detector",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "3",
  pages =        "239--249",
  month =        may,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/226295.226322",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:10 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "We illustrate the application of Nitpick, a
                 specification checker, to the design of a style
                 mechanism for a word processor. The design is cast,
                 along with some expected properties, in a subset of Z.
                 Nitpick checks a property by enumerating all possible
                 cases within some finite bounds, displaying as a
                 counterexample the first case for which the property
                 fails to hold. Unlike animation or execution tools,
                 Nitpick does not require state transitions to be
                 expressed constructively, and unlike theorem provers,
                 operates completely automatically without user
                 intervention. Using a variety of reduction mechanisms,
                 it can cover an enormous number of cases in a
                 reasonable time, so that subtle flaws can be rapidly
                 detected.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Corbett:1996:CAM,
  author =       "James C. Corbett",
  title =        "Constructing abstract models of concurrent real-time
                 software",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "3",
  pages =        "250--260",
  month =        may,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/226295.226323",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:10 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Concurrent real-time software is used in many
                 safety-critical applications. Assuring the quality of
                 such software requires the use of formal methods.
                 Before a program can be analyzed formally, however, we
                 must construct a mathematical model that captures the
                 aspects of the program we want to verify. In this
                 paper, we show how to construct mathematical models of
                 concurrent real-time software that are suitable for
                 analyzing the program's timing properties. Our approach
                 differs from schedulability analysis in that we do not
                 assume that the software has a highly restricted
                 structure (e.g., a set of periodic tasks). Also, unlike
                 most more abstract models of real-time systems, we
                 account for essential properties of real
                 implementations, such as resource constraints and
                 run-time overhead.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Godefroid:1996:UPO,
  author =       "Patrice Godefroid and Doron Peled and Mark
                 Staskauskas",
  title =        "Using partial-order methods in the formal validation
                 of industrial concurrent programs",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "3",
  pages =        "261--269",
  month =        may,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/226295.226324",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:10 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "We have developed a formal validation tool that has
                 been used on several projects that are developing
                 software for AT\&T's 5ESS$^{{\TM }}$ telephone
                 switching system. The tool uses Holzmann's supertrace
                 algorithm to check for errors such as deadlock and
                 livelock in networks of communicating processes. The
                 validator invariably finds subtle errors that were
                 missed during thorough simulation and testing; however,
                 the brute-force search it performs can result in
                 extremely long running times, which can be frustrating
                 to users. Recently, a number of researchers have been
                 investigating techniques known as partial-order methods
                 that can significantly reduce the running time of
                 formal validation by avoiding redundant exploration of
                 execution scenarios. In this paper, we describe the
                 design of a partial-order algorithm for our validation
                 tool and discuss its effectiveness. We show that a
                 careful compile-time static analysis of process
                 communication behavior yields information that can be
                 used during validation to dramatically improve its
                 performance. We demonstrate the effectiveness of our
                 partial-order algorithm by presenting the results of
                 experiments with actual industrial examples drawn from
                 a variety of 5ESS$^{{\TM }}$ application domains,
                 including call processing, signalling, and switch
                 maintenance.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Barjaktarovic:1996:FSV,
  author =       "Milica Barjaktarovic and Shiu-Kai Chin and Kamal
                 Jabbour",
  title =        "Formal specification and verification of the kernel
                 functional unit of the {OSI} session layer protocol and
                 service using {CCS}",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "3",
  pages =        "270--279",
  month =        may,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/226295.226325",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:10 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This paper describes an application of formal methods
                 to protocol specification, validation and verification.
                 Formal methods can be incorporated in protocol design
                 and testing so that time and resources are saved on
                 implementation, testing, and documentation. In this
                 paper we show how formal methods can be used to write
                 the control sequence, i.e. pseudo code, which can be
                 formally tested using automated support. The formal
                 specification serves as a blueprint for a correct
                 implementation with desired properties. As a formal
                 method we chose a process algebra called ``plain''
                 Calculus of Communicating Systems (CCS). Our specific
                 objectives were to: (1) build a CCS model of the Kernel
                 Functional Unit of OSI session layer service: (2)
                 obtain a session protocol specification through
                 stepwise refinement of the service specification; and
                 (3) verify that the protocol specification satisfies
                 the service specification. We achieved all of our
                 objectives. Verification and validation were
                 accomplished by using the CCS's model checker, the
                 Edinburgh Concurrency Workbench (CWB). We chose plain
                 CCS because of its succinct, abstract, and modular
                 specifications, strong mathematical foundation which
                 allows for formal reasoning and proofs, and existence
                 of the automated support tool which supports temporal
                 logic. The motivation for this work is: (1) testing the
                 limits of CCS's succinct notation; (2) combining CCS
                 and temporal logic; and (3) using a model-checker on a
                 real-life example.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Atlee:1996:LMS,
  author =       "Joanne M. Atlee and Michael A. Buckley",
  title =        "A logic-model semantics for {SCR} software
                 requirements",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "3",
  pages =        "280--292",
  month =        may,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/226295.226326",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:10 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This paper presents a simple logic-model semantics for
                 Software Cost Reduction (SCR) software requirements.
                 Such a semantics enables model-checking of native SCR
                 requirements and obviates the need to transform the
                 requirements for analysis. The paper also proposes
                 modal-logic abbreviations for expressing conditioned
                 events in temporal-logic formulae. The Symbolic Model
                 Verifier (SMV) is used to verify that an SCR
                 requirements specification enforces desired global
                 requirements, expressed as formulae in the enhanced
                 logic. The properties of a small system (an automobile
                 cruise control system) are verified, including an
                 invariant property that could not be verified
                 previously. The paper concludes with a discussion of
                 how other requirements notations for
                 conditioned-event-driven systems could be similarly
                 checked.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Denney:1996:WSA,
  author =       "Richard Denney and Dick Kemmerer and Nancy Leveson and
                 Alberto Savoia",
  title =        "Why state-of-the-art is not state-of-the-practice
                 (panel)",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "3",
  pages =        "293",
  month =        may,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/226295.226327",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:10 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Doernhoefer:1996:SNSb,
  author =       "Mark Doernhoefer",
  title =        "Surfing the net for {{\booktitle{Software Engineering
                 Notes}}}",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "4",
  pages =        "6--9",
  month =        jul,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/232069.232074",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Kitchenham:1996:ESEc,
  author =       "Barbara Ann Kitchenham",
  title =        "Evaluating software engineering methods and tool ---
                 part 3: selecting an appropriate evaluation method ---
                 practical issues",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "4",
  pages =        "9--12",
  month =        jul,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/232069.232075",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "In the first article about the DESMET evaluation
                 methodology, I identified nine different types of
                 evaluation:1. Quantitative Experiments2. Quantitative
                 Case Studies3. Quantitative Surveys4. Feature Analysis
                 --- Screening mode5. Feature Analysis --- Case Study6.
                 Feature Analysis --- Experiment7. Feature Analysis ---
                 Survey8. Qualitative Effects Analysis9. Benchmarking.
                 In the last article I discussed various technical
                 criteria that would influence your choice of an
                 evaluation method. In principle, you should select the
                 simplest evaluation method appropriate for your
                 specific evaluation requirements and organisational
                 capability. However there are a number of constraints
                 that can influence your final choice of evaluation
                 method: * the elapsed time that is needed for the
                 different evaluation options; * the confidence that a
                 user can have in the results of an evaluation; * the
                 cost of an evaluation;This information may be useful in
                 two circumstances:1. When you want to decide between a
                 quantitative case study and a quantitative formal
                 experiment and there are no clear technical reasons for
                 preferring one to the other.2. When you want to ensure
                 that the evaluation you have decided to undertake is
                 feasible. These issues are discussed in this article.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Neumann:1996:RPCb,
  author =       "Peter G. Neumann",
  title =        "Risks to the public in computers and related systems",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "4",
  pages =        "12--18",
  month =        jul,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/232069.232076",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Samadzadeh:1996:SSR,
  author =       "M. Samadzadeh and M. K. Zand",
  title =        "{SSR'95} summary report",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "4",
  pages =        "39--40",
  month =        jul,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/232069.232077",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Smith:1996:FIC,
  author =       "Graeme Smith",
  title =        "{First ISEW Cleanroom} workshop summary",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "4",
  pages =        "41--44",
  month =        jul,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/232069.232078",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Jelly:1996:CRD,
  author =       "Innes Jelly and Ian Gorton",
  title =        "Current research directions in software engineering
                 for parallel and distributed systems",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "4",
  pages =        "44--46",
  month =        jul,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/232069.232080",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "In March 1996, the First IFIP Workshop on Software
                 Engineering for Parallel and Distributed Systems was
                 held in Berlin, Germany. The two day workshop was
                 co-sponsored by the German Computer Society GI
                 (Gesellschaft fur Informatik), and organised in
                 association with the International Software Engineering
                 Conference --- ICSE 18. The aim of the workshop was to
                 provide a forum for exchange of information and
                 publication of the latest technological and theoretical
                 advances in software engineering for parallel and
                 distributed systems. Our previous experience of running
                 short workshop on this topic in Aachen, Germany (1993),
                 Como, Italy (1994) and Hawaii, USA (1995) had indicated
                 that there was a growing need for this specialized
                 event [1], [2], [3]. The International Programme
                 Committee was formed from a group of experts in
                 different countries and application areas, all of whom
                 were enthusiastic to explore and publicize contemporary
                 research in parallel and distributed software
                 engineering. In this report we discuss the rationale
                 for the workshop, detail its outcomes and look at some
                 of the research issues that it highlighted. The
                 proceedings of the workshop are published by Chapman
                 and Hall [4], and full information is available on the
                 PDSE Web page:
                 http://www.dcs.shef.ac.uk/~prc/PDSE.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Ludewig:1996:STI,
  author =       "Jochen Ludewig",
  title =        "Summary of the {Third International Workshop on
                 Software Engineering Education (IWSEE3)}",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "4",
  pages =        "47--51",
  month =        jul,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/232069.232081",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Bull:1996:RDP,
  author =       "Tim Bull and Keith Bennett",
  title =        "A report on the {Durham Program Transformations
                 Workshop}",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "4",
  pages =        "51--53",
  month =        jul,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/232069.232082",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "A Workshop on Program Transformation Systems was held
                 in the Centre for Software Maintenance at University of
                 Durham on 1st and 2nd April 1996. The Workshop was
                 intended as a follow up for the successful event held
                 on the same topic at ICSE in Seattle in 1995.
                 Twenty-three people attended the Workshop, and this is
                 a short report on the proceedings.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Sommerville:1996:SIW,
  author =       "Ian Sommerville",
  title =        "{Sixth International Workshop on Software
                 Configuration Management}",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "4",
  pages =        "54--57",
  month =        jul,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/232069.232083",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Muhlhauser:1996:MWM,
  author =       "Max M{\"u}hlh{\"a}user",
  title =        "{MMSD'96: Workshop on Multimedia Software
                 Development}",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "4",
  pages =        "58--63",
  month =        jul,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/232069.232085",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Multimedia imposes quite a number of specific issues
                 and requirements on software. While system support for
                 multimedia has been seriously investigated for several
                 years now, the software engineering community has not
                 yet reached a deep understanding of the impacts of
                 multimedia on their field. MMSD'96 brought together a
                 representative spectrum of researchers investigating
                 this issue. Four general observations could be retained
                 from their contributions: 1. distributed multimedia
                 applications exploit both more long-term potential and
                 more persistent research problems than multimedia PC
                 applications; 2. A reference model of multimedia
                 software is not yet in reach; the large number of
                 models proposed, even at MMSD, still lack better
                 rationales, theoretic foundation, and convergence. 3.
                 the MMSD community brings together people with a
                 ``document-background'' and those with a ``software
                 background''; their views and approaches are still far
                 from being harmonized. 4. While the multimedia
                 community struggles for a common understanding among
                 its members, it is in desperate need of a harmonization
                 with approaches to distributed software development. In
                 the remainder of this article, we will review issues to
                 be addressed in the MMSD context, discuss the
                 contributions made at the workshop itself, and draw
                 conclusions for the state of the art.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Rosenblum:1996:FMT,
  author =       "David S. Rosenblum",
  title =        "Formal methods and testing: why the state-of-the art
                 is not the state-of-the practice",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "4",
  pages =        "64--66",
  month =        jul,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/232069.232086",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Ramachandran:1996:RDS,
  author =       "Muthu Ramachandran",
  title =        "Requirements-driven software test: a process-oriented
                 approach",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "4",
  pages =        "66--70",
  month =        jul,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/232069.232088",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Testing is essential for proving the quality of all
                 products. It is expensive and hard to test interactive
                 multimedia systems. This paper proposes a model for the
                 test process, and investigates the possibility of
                 deriving test cases from system models and requirement
                 analysis techniques such as requirements definition and
                 specification. We believe this will allow early
                 detection of errors thereby reducing the cost for
                 testing. These test cases can also be used as
                 guidelines on design for testability. Effectiveness of
                 the test tools depends on the careful selection of test
                 cases.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Vazquez:1996:AAD,
  author =       "Federico Vazquez",
  title =        "An algebra approach to the deduction of data flow
                 diagrams and object oriented diagrams from algebraic
                 specifications",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "4",
  pages =        "71--80",
  month =        jul,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/232069.232090",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The Software Engineering procedures usually lack
                 formal mathematical foundations. This paper presents a
                 formal approach for the development of Specifications,
                 Data Flow Diagrams and Object Oriented Diagrams using
                 algebraic theory. The use of algebraic theory allows
                 the check for completeness and consistency and the
                 generation of automatic procedures for translating
                 specifications into Data Flow Diagrams or Object
                 Oriented Diagrams.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Laitinen:1996:EUS,
  author =       "Kari Laitinen",
  title =        "Estimating understandability of software documents",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "4",
  pages =        "81--92",
  month =        jul,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/232069.232092",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Software developers and maintainers need to read and
                 understand source programs and other kinds of software
                 documents in their work. Understandability of software
                 documents is thus important. This paper introduces a
                 method for estimating the understandability of software
                 documents. The method is based on a language theory
                 according to which every software document is
                 considered to contain a language of its own, which is a
                 set of symbols. The understandability of documents
                 written according to different documentation practices
                 can be compared using the rules of the language theory.
                 The method and the language theory are presented by
                 using source programs with different naming styles as
                 example documents. The method can, at least
                 theoretically, be applied to any kind of document. It
                 can also be used to explain the benefits of some
                 well-known software design methods.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Ryant:1996:LSM,
  author =       "Ivan Ryant",
  title =        "7-layered (small mental exercise)",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "4",
  pages =        "93",
  month =        jul,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/232069.232095",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Ayers:1996:BRR,
  author =       "Michael Ayers",
  title =        "Book Review: {{\booktitle{Reliable Object-Oriented
                 Software --- Applying Analysis and Design}}}",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "4",
  pages =        "94--95",
  month =        jul,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/232069.565768",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Ayers:1996:BRB,
  author =       "Michael Ayers",
  title =        "Book Review: {{\booktitle{Bringing Design to
                 Software}}}",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "4",
  pages =        "95--96",
  month =        jul,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/232069.565769",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Finkbine:1996:BRSa,
  author =       "Ronald B. Finkbine",
  title =        "Book Review: {{\booktitle{Software Development Using
                 Eiffel}}}",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "4",
  pages =        "96",
  month =        jul,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/232069.565785",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Finkbine:1996:BRSb,
  author =       "Ronald B. Finkbine",
  title =        "Book Review: {{\booktitle{Software Fault
                 Tolerance}}}",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "4",
  pages =        "96",
  month =        jul,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/232069.565786",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Hollenbach:1996:BRS,
  author =       "Frank Hollenbach",
  title =        "Book Review: {{\booktitle{Software Systems
                 Construction with Examples in Ada}}}",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "4",
  pages =        "97",
  month =        jul,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/232069.565787",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/adabooks.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Kelsey:1996:BRI,
  author =       "Robert Bruce Kelsey",
  title =        "Book Review: {{\booktitle{An ISO 9000 Approach To
                 Building Quality Software}}}",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "4",
  pages =        "97--98",
  month =        jul,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/232069.565788",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Kelsey:1996:BRQ,
  author =       "Robert Bruce Kelsey",
  title =        "Book Review: {{\booktitle{A Quantitative Approach to
                 Software Management: The ami Handbook}} [ISBN
                 0-201-87746-5, 179 pages, \$24.69]}",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "4",
  pages =        "98--99",
  month =        jul,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/232069.565792",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Kelsey:1996:BRH,
  author =       "Robert Bruce Kelsey",
  title =        "Book Review: {{\booktitle{How To Run Successful
                 Projects}}}",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "4",
  pages =        "99",
  month =        jul,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/232069.565804",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Kelsey:1996:BRM,
  author =       "Robert Bruce Kelsey",
  title =        "Book Review: {{\booktitle{A MAP For Software
                 Acquisition}}}",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "4",
  pages =        "99",
  month =        jul,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/232069.565805",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Leisner:1996:BRD,
  author =       "Marty Leisner",
  title =        "Book Review: {{\booktitle{Debugging the Development
                 Process}}}",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "4",
  pages =        "99--100",
  month =        jul,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/232069.565806",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Leisner:1996:BRM,
  author =       "Marty Leisner",
  title =        "Book Review: {{\booktitle{Managing Your Move to Object
                 Technology: Guidelines and Strategies for a Smooth
                 Transition}}}",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "4",
  pages =        "100",
  month =        jul,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/232069.566079",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{OLaughlin:1996:BRB,
  author =       "Brian O'Laughlin",
  title =        "Book Review: {{\booktitle{Beyond Technology's
                 Promise}}}",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "4",
  pages =        "100--101",
  month =        jul,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/232069.566080",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{OLaughlin:1996:BRC,
  author =       "Brian O'Laughlin",
  title =        "Book Review: {{\booktitle{C\slash C++ Software Quality
                 Tools}}}",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "4",
  pages =        "101--103",
  month =        jul,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/232069.566081",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{OLaughlin:1996:BRF,
  author =       "Brian O'Laughlin",
  title =        "Book Review: {{\booktitle{Foundations of Software
                 Measurement}}}",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "4",
  pages =        "103",
  month =        jul,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/232069.566082",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Person:1996:BRO,
  author =       "Suzette Person",
  title =        "Book Review: {{\booktitle{The Object Primer}}}",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "4",
  pages =        "104",
  month =        jul,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/232069.566083",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Raynham:1996:BRR,
  author =       "Peter Raynham",
  title =        "Book Review: {{\booktitle{Rapid Software Development
                 with Smalltalk}}}",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "4",
  pages =        "104",
  month =        jul,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/232069.566084",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Garlan:1996:FSF,
  author =       "David Garlan and Mark Morieoni",
  title =        "The Fourth Symposium on the Foundations of Software
                 Engineering {(FSE4)}",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "5",
  pages =        "4",
  month =        sep,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/235969.773580",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:16 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Fuggetta:1996:IPG,
  author =       "Alfonso Fuggetta",
  title =        "{ICSE 97}: picking up the gauntlet",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "5",
  pages =        "5--6",
  month =        sep,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/235969.235970",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:16 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Doernhoefer:1996:SNSc,
  author =       "Mark Doernhoefer",
  title =        "Surfing the net for {{\booktitle{Software Engineering
                 Notes}}}",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "5",
  pages =        "6--10",
  month =        sep,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/235969.235971",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:16 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Sadler:1996:ESE,
  author =       "Chris Sadler and Barbara Ann Kitchenham",
  title =        "Evaluating software engineering methods and tool ---
                 part 4: the influence of human factors",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "5",
  pages =        "11--13",
  month =        sep,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/235969.235972",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:16 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "In previous articles, we have described the range of
                 methods available if you want to evaluate a software
                 engineering method/tool and the criteria you need to
                 consider to select a method appropriate to your
                 individual circumstances. In future articles we will
                 describe some guidelines to help you perform
                 quantitative case studies and feature analysis.
                 However, in this article we would like to review some
                 of the human factors issues that can affect an
                 evaluation exercise.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Neumann:1996:RPCc,
  author =       "Peter G. Neumann",
  title =        "Risks to the public in computers and related systems",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "5",
  pages =        "13--20",
  month =        sep,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/235969.235975",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:16 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Kramer:1996:SIW,
  author =       "Jeff Kramer and Alexander L. Wolf",
  title =        "Succeedings of the {8th International Workshop on
                 Software Specification and Design}",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "5",
  pages =        "21--35",
  month =        sep,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/235969.235976",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:16 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The 8th International Workshop on Software
                 Specification and Design (IWSSD-8) was held at Schloss
                 Velen, Germany, in March 1996. In order to foster
                 informed and fruitful discussions, the workshop was an
                 invitation-only event of limited size. Based on formal
                 submissions, approximately 60 people were selected and
                 invited. Like its predecessors, IWSSD-8 maintained the
                 principle that the accepted papers should serve as
                 background material for the workshop. Therefore, the
                 workshop did not include formal paper presentations,
                 but rather provided an opportunity to engage in real
                 work, with intensive discussions focussed around major
                 themes. Each theme was discussed in a separate working
                 group directed by a Working Group Chair who organized
                 their group members so as to discuss the research
                 issues of that particular theme. This year the themes
                 selected were Requirements Engineering, Design
                 Engineering, Software Architecture, and
                 Concurrency/Distribution.IWSSD has established a
                 tradition of using ``case studies'' as a focus for
                 individual working groups. These case studies, supplied
                 in advance to participants, have proved to be a
                 fruitful way of working. Evidence of this can be seen
                 most clearly in the ``succeedings'' or workshop reports
                 which have followed previous workshops. It was decided
                 that for IWSSD-8, in order to provide common ground
                 between the themes, a single common case study should
                 be used. The ``Report on the Inquiry into the London
                 Ambulance Service'' was selected, with each theme
                 drawing on it in a manner appropriate to their own
                 interests and concerns. The London Ambulance Service
                 (LAS) is briefly summarized below and discussed in the
                 first paper appearing in the proceedings. The case
                 study was presented in a plenary session at the
                 beginning of the workshop and the findings of the
                 different working groups presented and discussed at the
                 end of the workshop, again in a plenary session. In
                 order to make best use of the time available, working
                 group members were asked to prepare for the workshop by
                 familiarizing themselves with the case study and the
                 major issues in their area relevant to that case study.
                 We believe that this format made it both attractive and
                 rewarding for people to attend, and was a major reason
                 for the success of this workshop.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Tatsuta:1996:CCA,
  author =       "Tanehiro Tatsuta",
  title =        "Conference on computer-aided software engineering
                 summary report",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "5",
  pages =        "36--39",
  month =        sep,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/235969.235978",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:16 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The fifth Conference on Computer-Aided Software
                 Engineering was held July 10-12, 1996 in Tokyo in
                 conjunction with CASE Japan'96. The general chair,
                 Yoshihiro Matsumoto (University of OSAKA Institute of
                 Technology), organized the program, along with the
                 vice-chair, Hiroshi Mukaiyama (Japan Information
                 Processing Developing Center), Ichiro Moriyama (Reed
                 Exhibitions Japan), and the 17 members of the program
                 Screening Committee. Reed Exhibitions Japan sponsored
                 the Conference and all the related events as well. The
                 program consisted of the Keynote Address and 20
                 sessions. I have selected several features out of the
                 program and have submitted here as a Summary Report on
                 behalf of all the members of the Committee so as to
                 attempt to capture the essence of the Conference.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Tracz:1996:EDC,
  author =       "Will Tracz",
  title =        "{Evolutionary Design of Complex Software (EDCS)} kick
                 off workshop summary",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "5",
  pages =        "40--42",
  month =        sep,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/235969.235979",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:16 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Favaro:1996:SPC,
  author =       "John Favaro",
  title =        "On the scalability problem in {COTS-based} programming
                 environments",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "5",
  pages =        "43--46",
  month =        sep,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/235969.235981",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:16 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This article reports on a software design experience
                 in which the concept of scalability is applied to the
                 architecture of a software development environment
                 based upon Commercial-Off-The-Shelf (COTS) tools. The
                 experience has raised many issues, which are summarized
                 here together with attempts to analyse their origins
                 and indicate solutions. We believe that problems with
                 the introduction of scalability will be encountered by
                 any project attempting the integration of heterogeneous
                 COTS products.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Day:1996:URC,
  author =       "Donald L. Day",
  title =        "User responses to constraints in computerized design
                 tools (extended abstract)",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "5",
  pages =        "47--50",
  month =        sep,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/235969.235982",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:16 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This study sought to improve our understanding of user
                 attitudes, perceptions, satisfaction and behavior in
                 reference to constraints within computerized design
                 tools. It also attempted to examine the differences in
                 perspective between tool builders and tool users
                 regarding appropriate design practices, as communicated
                 via design tools. The study created a typology of
                 constraints and described a set of strategies users
                 employ in the negotiation of constraints encountered in
                 of computer-aided systems engineering (CASE) tools.
                 Also addressed were (a) the cognitive fit between tool
                 users and tool builders in terms of appropriate and
                 necessary constraints, and (b) issues of creativity in
                 the design of computer software. An eight-page
                 questionnaire containing 61 questions was developed by
                 conducting structured interviews with tool users and
                 managers, in industry. Following a pre-test, the
                 questionnaire was administered to an international
                 sample of tool users, tool builders and non-CASE
                 software application developers (a control group). More
                 than 200 questionnaires were returned (half via
                 electronic mail) from respondents largely in North
                 America, but also from Europe, Australia and New
                 Zealand. Analysis followed a factorial design that
                 evaluated the impact of normative attitudes toward and
                 perceptions of control upon satisfaction and behavior.
                 Most respondents reported not feeling especially
                 encumbered with constraints in their tools, although
                 most also reserved the right to override or work around
                 constraints, depending upon circumstances. The study
                 found that normative attitudes toward control have a
                 significant impact upon behavior in response to
                 constraints in computerized design tools. (Favorable
                 attitudes toward control are associated significantly
                 with conforming behavior.) It also found that
                 perceptions of control have a significant impact upon
                 satisfaction and behavior. (Perceptions of high control
                 are associated significantly with low satisfaction and
                 with resistant behavior.) No significant differences
                 were observed between tool users and tool builders in
                 terms of key constructs. Suggestions for future
                 research include investigation of concerns raised by
                 the current study, examination of similar effects in
                 other domains (such as architectural design), and
                 development of the potential for intelligent machine
                 guidance in creative design activities.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Zucconi:1996:BTS,
  author =       "Lin Zucconi and Karl Reed",
  title =        "Building testable software",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "5",
  pages =        "51--55",
  month =        sep,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/235969.235983",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:16 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This paper examines a connection between well known
                 specification, design, implementation methodologies and
                 test-design which appears not to have been previously
                 well-formulated. We refer to the fact that the use of
                 finite state machines (FSMs) in each development phase
                 (specification, design, implementation and testing) is
                 well known and documented. However, despite the fact
                 that much of this work is more than twenty years old,
                 there appears to be no detailed proposal for a
                 consistent FSM-based approach be used across all
                 development phases for other than very specific
                 application types. We suggest that the adoption of a
                 systematic FSM-based approach across all phases,
                 including implementation, may allow a number of major
                 problems in software development to be either
                 eliminated or simplified. In this way, testable, highly
                 dependable systems can be produced. In such systems,
                 behaviour is explicitly defined, built, and tested
                 using both functional and structural methods. Undesired
                 behaviours can be found and eliminated, and abnormal or
                 unexpected input explicitly handled. We discuss the
                 issues we consider to be involved, and the benefits
                 which we expect may be gained. We also identify those
                 areas where further work appears to be required.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Cook:1996:SDG,
  author =       "Michael Cook",
  title =        "Software design is a good thing",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "5",
  pages =        "56--57",
  month =        sep,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/235969.235985",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:16 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Ying:1996:SCS,
  author =       "Jing Ying and Zhijun He",
  title =        "Some comments on software methodology versus {CASE}",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "5",
  pages =        "58--59",
  month =        sep,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/235969.235986",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:16 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This paper presents a personal viewpoint on the
                 relationship between software methodology and
                 Computer-aided Software Engineering (CASE). Also
                 several questions are put forward: Can CASE technology
                 contribute to the high quality and efficient
                 productivity of software product? Can CASE explore its
                 largest power based on current software methodology? Or
                 need current software methodology be revolutionized to
                 a great degree? How should software researchers deal
                 with the roles, significance and relationships among
                 CASE, software methodology, software re-engineering,
                 and so on? The answers to these questions will have
                 vital effect on the development of software industry in
                 the next century.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Denney:1996:CMB,
  author =       "Richard Denney",
  title =        "A comparison of the model-based \& algebraic styles of
                 specification as a basis for test specification",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "5",
  pages =        "60--64",
  month =        sep,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/235969.235988",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:16 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The use of formal specifications as a basis for
                 specifying functional tests has been discussed by a
                 numbers of researchers with most work focusing on one
                 style of specification or another separately. But is
                 any single style an adequate basis for writing
                 functional tests? The strengths, weaknesses and
                 complementary nature of two popular styles of software
                 specification, model-based and algebraic, are examined
                 as a basis for functional test specification.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Zhang:1996:NOA,
  author =       "Jiazhong Zhang and Zhijian Wang",
  title =        "{NDHORM}: an {OO} approach to requirements modeling",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "5",
  pages =        "65--69",
  month =        sep,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/235969.235990",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:16 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "In this paper, we propose an OO approach to
                 requirement modeling, which includes a hierarchical
                 object-oriented requirements model NDHORM and its
                 requirements modeling procedure. The NDHORM model
                 concentrates on capturing and simulating dynamic
                 interaction relationships between problem objects in a
                 real world, as well as the stepwise refinement of
                 interacting objects during the modeling process. A
                 behavior-directed method and its uniform notations for
                 identifying objects, attributes, services,
                 relationships, etc. are also provided.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Johnson:1996:EFA,
  author =       "Philip Johnson",
  title =        "{Egret}: a framework for advanced {CSCW}
                 applications",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "5",
  pages =        "70--71",
  month =        sep,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/235969.235989",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:16 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Egret is a publicly available, advanced framework for
                 construction of computer-supported cooperative work
                 applications. Egret provides an approach to multi-user,
                 interactive application development that differs
                 markedly from other frameworks or infrastructures, such
                 as Groupkit, WWW, or Lotus Notes. This short paper
                 introduces Egret, its architecture, design philosophy,
                 selected applications, and interest groups within the
                 software engineering community. It concludes with
                 information on how Egret's sources, binaries, and
                 documentation may be obtained free of charge using the
                 Internet.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Lam:1996:TDS,
  author =       "Wing Lam and Ben Whittle",
  title =        "A taxonomy of domain-specific reuse problems and their
                 resolutions --- version 1.0",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "5",
  pages =        "72--77",
  month =        sep,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/235969.235992",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:16 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This paper presents a taxonomy of problems related to
                 domain-specific reuse. The taxonomy identifies seven
                 major problem categories (such as domain, modeling
                 notation and viewpoints) and their sub-categories. A
                 description of each problem in the taxonomy is given,
                 illustrated where appropriate, with an example taken
                 from an industrial case-study performed by the authors
                 for Rolls-Smiths Engine Controls Limited (RoSEC). A
                 resolution matrix is also presented, which suggests
                 practical strategies for resolving each kind of problem
                 described in the taxonomy.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Harrison:1996:UTC,
  author =       "R. Harrison and L. G. Samaraweera",
  title =        "Using test case metrics to predict code quality and
                 effort",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "5",
  pages =        "78--88",
  month =        sep,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/235969.235993",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:16 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This paper reports on an investigation into the use of
                 a design metric (the number of test cases) to predict
                 code quality, development and testing time during the
                 production of functional and object-oriented programs.
                 We report on whether a significant difference exists in
                 the number of test cases for equivalent functional and
                 object-oriented programs as well as determining whether
                 these test cases metrics are correlated with various
                 development and design metrics for the different
                 paradigms. The results of this investigation suggest
                 that test case metrics could be used both as indicators
                 of code quality and to predict the development and
                 testing effort required for functional and
                 object-oriented programs.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Henderson-Sellers:1996:MVS,
  author =       "B. Henderson-Sellers",
  title =        "The mathematical validity of software metrics",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "5",
  pages =        "89--94",
  month =        sep,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/235969.235994",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:16 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Mathematical modelling, especially in software
                 engineering metrics, requires more emphasis to be
                 placed on the validity of the selected mathematical
                 tools and techniques to be used. There are a plethora
                 of occurrences in the recent literature of the
                 misapplication of quantitative techniques together with
                 errors in the underlying mathematics. Software
                 engineering metrics needs to take more care in its use
                 of mathematics if it is to gain credence in the
                 scientific and engineering communities.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Drori:1996:PDI,
  author =       "Offer Drori",
  title =        "Planning and design of information systems using
                 {OODPM}",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "5",
  pages =        "95--98",
  month =        sep,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/235969.235995",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:16 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The process of system analysis and its planning
                 includes various stages. Over the years various
                 methodologies have been defined for this process. The
                 methodologies themselves constitute a method that
                 regulates the various stages in the process of planning
                 and developing the information system. Each methodology
                 has its own advantages and disadvantages but,
                 generally, the correct methodology must be adapted to
                 the required system. The aim of this article is to
                 describe a new methodology, known as OODPM --- Object
                 Oriented Design by a Prototype Methodology, that
                 integrates two existing methodologies, namely OOD and
                 Prototype, bringing together many advantages. The
                 principle advantages of this method are as follows: the
                 ability to reduce planning time; to better define user
                 requirements; to plan an enhanced information system;
                 to bridge the gap between the design of the required
                 solution and its development. This article will offer a
                 brief survey of the methodologies currently used in the
                 development and planning of information systems,
                 focusing on the OODPM method and the tools it uses.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Mazhindu-Shumba:1996:CNW,
  author =       "Rose Mazhindu-Shumba",
  title =        "A comment on the notation of the {Wirfs--Brock} et al.
                 object-oriented design method",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "5",
  pages =        "99",
  month =        sep,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/235969.235998",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:16 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Jackson:1996:PMS,
  author =       "Michael Jackson",
  title =        "Problems, methods, and structures (abstract)",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "6",
  pages =        "1",
  month =        nov,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/250707.239100",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:17 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Petroski:1996:EBC,
  author =       "Henry Petroski",
  title =        "Engineering bridges: from concept to reality
                 (abstract)",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "6",
  pages =        "1",
  month =        nov,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/250707.239101",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:17 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Rechtin:1996:SSA,
  author =       "Eberhardt Rechtin",
  title =        "Software systems architecting (abstract)",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "6",
  pages =        "1",
  month =        nov,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/250707.239102",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:17 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Boehm:1996:IPS,
  author =       "Barry Boehm",
  title =        "Industrial priorities for software engineering
                 research (panel)",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "6",
  pages =        "2",
  month =        nov,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/250707.239103",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:17 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Kiczales:1996:WCP,
  author =       "Gregor Kiczales",
  title =        "What can programming languages contribute to software
                 engineering, and vice versa? (panel)",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "6",
  pages =        "2",
  month =        nov,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/250707.239099",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:17 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Magee:1996:DSS,
  author =       "Jeff Magee and Jeff Kramer",
  title =        "Dynamic structure in software architectures",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "6",
  pages =        "3--14",
  month =        nov,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/250707.239104",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:17 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Much of the recent work on Architecture Description
                 Languages (ADL) has concentrated on specifying
                 organisations of components and connectors which are
                 static. When the ADL specification is used to drive
                 system construction, then the structure of the
                 resulting system in terms of its component instances
                 and their interconnection is fixed. This paper examines
                 ADL features which permit the description of dynamic
                 software architectures in which the organisation of
                 components and connectors may change during system
                 execution. The paper outlines examples of language
                 features which support dynamic structure. These
                 examples are taken from Darwin, a language used to
                 describe distributed system structure. An operational
                 semantics for these features is presented in the $ \pi
                 $-calculus, together with a discussion of their
                 advantages and limitations. The paper discusses some
                 general approaches to dynamic architecture description
                 suggested by these examples.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{LeMetayer:1996:SAS,
  author =       "Daniel {Le M{\'e}tayer}",
  title =        "Software architecture styles as graph grammars",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "6",
  pages =        "15--23",
  month =        nov,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/250707.239105",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:17 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "We present a formalism for the definition of software
                 architectures in terms of graphs. Nodes represent the
                 individual agents and edges define their
                 interconnection. Individual agents can communicate only
                 along the links specified by the architecture. The
                 dynamic evolution of the overall architecture is
                 defined independently by a 'coordinator'. An
                 architecture style is a class of architectures
                 characterised by a graph grammar. The rules of the
                 coordinator are statically checked to ensure that they
                 preserve the constraints imposed by the architecture
                 style.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Medvidovic:1996:UOO,
  author =       "Nenad Medvidovic and Peyman Oreizy and Jason E.
                 Robbins and Richard N. Taylor",
  title =        "Using object-oriented typing to support architectural
                 design in the {C2} style",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "6",
  pages =        "24--32",
  month =        nov,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/250707.239106",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:17 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Software architectures enable large-scale software
                 development. Component reuse and substitutability, two
                 key aspects of large-scale development, must be planned
                 for during software design. Object-oriented (OO) type
                 theory supports reuse by structuring inter-component
                 relationships and verifying those relationships through
                 type checking in an architecture definition language
                 (ADL). In this paper, we identify the issues and
                 discuss the ramifications of applying OO type theory to
                 the C2 architectural style. This work stems from a
                 series of experiments that were conducted to
                 investigate component reuse and substitutability in C2.
                 We also discuss the limits of applicability of OO
                 typing to C2 and how we addressed them in the C2 ADL.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Griswold:1996:TSP,
  author =       "William G. Griswold and Morison I. Chen and Robert W.
                 Bowdidge and J. David Morgenthaler",
  title =        "Tool support for planning the restructuring of data
                 abstractions in large systems",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "6",
  pages =        "33--45",
  month =        nov,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/250707.239107",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:17 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Restructuring software to improve its design can lower
                 software maintenance costs. One problem in carrying out
                 such a restructuring is planning the new detailed
                 design. The star diagram manipulable visualization can
                 help a programmer redesign a program based on abstract
                 data types. However, our measurements revealed that the
                 view can be too large for a programmer to effectively
                 assimilate. Also, design plans can be expressed only by
                 restructuring, although our studies revealed that it is
                 beneficial to preplan a restructuring. Finally, the
                 tool user can build a star diagram for only a single
                 data structure, although an abstract data type might
                 actually have several components or have multiple
                 instantiations. Exploiting basic properties of the star
                 diagram can mitigate these problems. First,
                 programmer-controlled elision can remove clutter from
                 the star diagram view. Second, elision and annotation
                 of star diagram components can mimic restructuring,
                 thereby supporting the planning of a restructuring.
                 Such support also allows for the planning of a
                 non-restructuring maintenance task. Finally, to
                 dynamically control what data structures are
                 visualized, the tool user can union star diagrams. We
                 built a star diagram planning tool for C programs,
                 measured its elision capabilities, and performed a
                 programmer study for the encapsulation of a widely-used
                 data structure in a 28,000 line program. We found that
                 the amount of elision can be substantial, but is not
                 always adequate. In the study we found that each
                 programming team successfully planned their
                 restructuring in rather different, unanticipated
                 ways.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Seiter:1996:EOB,
  author =       "Linda M. Seiter and Jens Palsberg and Karl J.
                 Lieberherr",
  title =        "Evolution of object behavior using context relations",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "6",
  pages =        "46--57",
  month =        nov,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/250707.239108",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:17 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "A collection of design patterns was described by
                 Gamma, Helm, Johnson, and Vlissides in 1994.
                 Recognizing that designs change, each pattern ensures
                 that a certain system aspect can vary over time such as
                 the operations that can be applied to an object or the
                 algorithm of a method. The patterns are described by
                 constructs such as the inheritance and reference
                 relations, attempting to emulate more dynamic
                 relationships. As a result, the design patterns
                 demonstrate how awkward it is to program natural
                 concepts of behavioral evolution when using a
                 traditional object-oriented language. In this paper we
                 present a new relation between classes: the context
                 relation. It directly supports behavioral evolution,
                 and it is meaningful at the analysis, design, and
                 implementation level. At the design level we picture a
                 context relation as a new form of arrow between
                 classes. At the implementation level we use a small
                 extension of C++. The basic idea is that if class C is
                 context-related to a base class B, then B-objects can
                 get their functionality dynamically altered by
                 C-objects. Our language construct for doing this is a
                 generalization of the method update in Abadi and
                 Cardelli's imperative object calculus. A C-object may
                 be explicitly attached to a B-object, or it may be
                 implicitly attached to a group of B-objects for the
                 duration of a method invocation. We demonstrate how the
                 context relation can be used to easily model and
                 program the Adapter, Bridge, Chain of Responsibility,
                 Decorator, Iterator, Observer, State, Strategy, and
                 Visitor patterns.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{VanHilst:1996:DCD,
  author =       "Michael VanHilst and David Notkin",
  title =        "Decoupling change from design",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "6",
  pages =        "58--69",
  month =        nov,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/250707.239109",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:17 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Parnas' seminal 1972 paper, ``On the Criteria To Be
                 Used in Decomposing Systems into Modules,'' identified
                 simplifying change as a critical criterion for
                 modularizing software. Successful designs are those in
                 which a change can be accommodated by modifying a
                 single module. There is a tacit assumption in most of
                 the literature that once a change has been limited to a
                 single module, the cost of making the change is
                 essentially inconsequential. But modules have
                 complexity of their own and are frequently large. Thus,
                 making a change can be expensive, even if limited to a
                 single module. We present a method of decomposing
                 modules into smaller components for the purpose of
                 supporting change. Although similar to the approach of
                 modularizing programs described by Parnas, our approach
                 is specific to decomposing modules. It is not intended
                 to replace traditional high level modularization but
                 rather to augment it with a second level of
                 modularization where the standard of information hiding
                 can be relaxed. The goal of the method is to make
                 modules easier to change by decomposing them around
                 smaller design decisions --- ideally encoding only one
                 design choice per submodule component. In this paper we
                 show how submodule components can be used to address
                 the issue of change. We also demonstrate how the
                 ability to address change with submodule components is,
                 to a large extent, independent of the design level
                 modularization. Moreover, we show that, at least in
                 some cases, by using submodule components the choice of
                 high level modularization can itself be changed without
                 having to rewrite large amounts of code.A method of
                 implementation is presented using inheritance,
                 parameterization, and static binding in a way that
                 minimizes implementation dependencies between
                 components. The method supports fine grained
                 decomposition with flexible composability and almost no
                 runtime overhead.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Damon:1996:CRS,
  author =       "Craig A. Damon and Daniel Jackson and Somesh Jha",
  title =        "Checking relational specifications with binary
                 decision diagrams",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "6",
  pages =        "70--80",
  month =        nov,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/250707.239110",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:17 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Checking a specification in a language based on sets
                 and relations (such as Z) can be reduced to the problem
                 of finding satisfying assignments, or models, of a
                 relational formula. A new method for finding models
                 using ordered binary decision diagrams (BDDs) is
                 presented that appears to scale better than existing
                 methods. Relational terms are replaced by matrices of
                 boolean formulae. These formulae are then composed to
                 give a boolean translation of the entire relational
                 formula. Throughout, boolean formulae are represented
                 with BDDs; from the resulting BDD, models are easily
                 extracted. The performance of the BDD method is
                 compared to our previous method based instead on
                 explicit enumeration. The new method performs as well
                 or better on most of our examples, but can also handle
                 specifications that, until now, we have been unable to
                 analyze.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Zhang:1996:PDP,
  author =       "Sean Zhang and Barbara G. Ryder and William Landi",
  title =        "Program decomposition for pointer aliasing: a step
                 toward practical analyses",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "6",
  pages =        "81--92",
  month =        nov,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/250707.239112",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:17 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Pointer aliasing analysis is crucial to compile-time
                 analyses for languages with general-purpose pointer
                 usage (such as C), but many aliasing methods have
                 proven quite costly. We present a technique that
                 partitions the statements of a program to allow
                 separate, and therefore possibly different, pointer
                 aliasing analysis methods to be used on independent
                 parts of the program. This decomposition enables
                 exploration of tradeoff between algorithm efficiency
                 and precision. We also present a new, efficient
                 flow-insensitive pointer aliasing algorithm, which is
                 used together with an existing flow-sensitive aliasing
                 algorithm in our experiments. We demonstrate our
                 technique in the context of determining side effects
                 and variable fetches through names containing pointer
                 dereferences (Thru-deref MOD/REF). Initial empirical
                 results using a combination of a flow-sensitive and a
                 flow-insensitive aliasing analysis on the same program,
                 demonstrate that the resulting analysis is much faster
                 than solely using the flow-sensitive method, and
                 obtains similar precision for the Thru-deref MOD/REF
                 problems.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Naumovich:1996:VCP,
  author =       "Gleb N. Naumovich and Lori A. Clarke and Leon J.
                 Osterweil",
  title =        "Verification of communication protocols using data
                 flow analysis",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "6",
  pages =        "93--105",
  month =        nov,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/250707.239114",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:17 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "In this paper we demonstrate the effectiveness of data
                 flow analysis for verifying requirements of
                 communication protocols. Data flow analysis is a static
                 analysis method for increasing confidence in the
                 correctness of software systems by automatically
                 verifying that a given software artifact (e.g., design
                 or code) must behave consistently with a specified
                 requirement. In this case study, we apply the FLAVERS
                 data flow analysis tool to pseudocode designs of the
                 three way handshake connection establishment protocol
                 and of the alternating bit protocol and prove that the
                 behavior of the pseudocode is consistent with protocol
                 behavioral requirement specifications. We show how
                 FLAVERS is a particularly effective because it is
                 computationally inexpensive, requires minimal human
                 interaction, and is a general approach that can be
                 applied incrementally until the desired accuracy is
                 achieved. In addition, we show how assumptions about
                 the environment in which a software system is executed
                 can be incorporated into the analysis, using message
                 losses as an example. We present experimental results
                 and derive some guidelines about the classes of
                 protocol requirement specifications that may be
                 amenable to verification using FLAVERS.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Dillon:1996:GOY,
  author =       "L. K. Dillon and Y. S. Ramakrishna",
  title =        "Generating oracles from your favorite temporal logic
                 specifications",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "6",
  pages =        "106--117",
  month =        nov,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/250707.239116",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:17 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This paper describes a generic tableau algorithm,
                 which is the basis for a general customizable method
                 for producing oracles from temporal logic
                 specifications. A generic argument gives semantic rules
                 with which to build the semantic tableau for a
                 specification. Parameterizing the tableau algorithm by
                 semantic rules permits it to easily accommodate a
                 variety of temporal operators and provides a clean
                 mechanism for fine-tuning the algorithm to produce
                 efficient oracles. The paper develops conditions to
                 ensure that a set of rules results in a correct tableau
                 procedure. It gives sample rules for a variety of
                 linear-time temporal operators and shows how rules are
                 tailored to reduce the size of an oracle.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Rosenblum:1996:PCE,
  author =       "David S. Rosenblum and Elaine J. Weyuker",
  title =        "Predicting the cost-effectiveness of regression
                 testing strategies",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "6",
  pages =        "118--126",
  month =        nov,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/250707.239118",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:17 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Selective regression testing strategies aim at
                 choosing an appropriate subset of test cases from among
                 a previously run test suite for a software system,
                 based on information about the changes made to the
                 system to create new versions. Although there has been
                 a significant amount of research in recent years on the
                 design of such strategies, there has been significantly
                 less investigation of their cost-effectiveness. In this
                 paper some computationally efficient predictors of the
                 cost-effectiveness of the two main classes of selective
                 regression testing approaches are presented. A case
                 study is described in which these predictors are used
                 to assess the appropriateness of using a particular
                 regression testing strategy to test multiple versions
                 of a widely-used software system.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Parissis:1996:SBT,
  author =       "Ioannis Parissis and Farid Ouabdesselam",
  title =        "Specification-based testing of synchronous software",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "6",
  pages =        "127--134",
  month =        nov,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/250707.239119",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:17 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Synchronous programming makes the implementation of
                 reactive software easier and safer. Automatic formal
                 verification methods based on model-checking have been
                 developed within the synchronous approach to prove the
                 satisfaction by the software of safety properties. But
                 these methods often require huge memory or time
                 amounts. As a solution to that problem we propose a set
                 of formally defined testing techniques allowing for
                 automatic test data generation. These techniques can be
                 used independently or as a complement to formal
                 verification, since they need the same set of
                 specifications.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Siff:1996:PGS,
  author =       "Michael Siff and Thomas Reps",
  title =        "Program generalization for software reuse: from {C} to
                 {C++}",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "6",
  pages =        "135--146",
  month =        nov,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/250707.239121",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:17 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "We consider the problem of software generalization:
                 Given a program component C, create a parameterized
                 program component C' such that C' is usable in a wider
                 variety of syntactic contexts than C. Furthermore, C'
                 should be a semantically meaningful generalization of
                 C; namely, there must exist an instantiation of C' that
                 is equivalent in functionality to C. In this paper, we
                 present an algorithm that generalizes C functions via
                 type inference. The original functions operate on
                 specific data types; the result of generalization is a
                 collection of C++ function templates that operate on
                 parameterized types. This version of the generalization
                 problem is useful in the context of converting existing
                 C programs to C++.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Barrett:1996:ASS,
  author =       "Daniel J. Barrett and Alan Kaplan and Jack C.
                 Wileden",
  title =        "Automated support for seamless interoperability in
                 polylingual software systems",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "6",
  pages =        "147--155",
  month =        nov,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/250707.239123",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:17 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Interoperability is a fundamental concern in many
                 areas of software engineering, such as software reuse
                 or infrastructures for software development
                 environments. Of particular interest to software
                 engineers are the interoperability problems arising in
                 polylingual software systems. The defining
                 characteristic of polylingual systems is their focus on
                 uniform interaction among a set of components written
                 in two or more different languages. Existing approaches
                 to support for interoperability are inadequate because
                 they lack seamlessness: that is, they generally force
                 software developers to compensate explicitly for the
                 existence of multiple languages or the crossing of
                 language boundaries. In this paper we first discuss
                 some foundations for polylingual interoperability, then
                 review and assess existing approaches. We then outline
                 PolySPIN, an approach in which interoperability can be
                 made transparent and existing systems can be made to
                 interoperate with no visible modifications. We also
                 describe PolySPINner, our prototype implementation of a
                 toolset providing automated support for PolySPIN. We
                 illustrate the advantages of our approach by applying
                 it to an example problem and comparing PolySPIN's ease
                 of use with that of an alternative, CORBA-style
                 approach.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Anderson:1996:MCL,
  author =       "Richard J. Anderson and Paul Beame and Steve Burns and
                 William Chan and Francesmary Modugno and David Notkin
                 and Jon D. Reese",
  title =        "Model checking large software specifications",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "6",
  pages =        "156--166",
  month =        nov,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/250707.239127",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:17 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "In this paper we present our results and experiences
                 of using symbolic model checking to study the
                 specification of an aircraft collision avoidance
                 system. Symbolic model checking has been highly
                 successful when applied to hardware systems. We are
                 interested in the question of whether or not model
                 checking techniques can be applied to large software
                 specifications. To investigate this, we translated a
                 portion of the finite-state requirements specification
                 of TCAS II (Traffic Alert and Collision Avoidance
                 System) into a form accepted by a model checker (SMV).
                 We successfully used the model checker to investigate a
                 number of dynamic properties of the system. We report
                 on our experiences, describing our approach to
                 translating the specification to the SMV language and
                 our methods for achieving acceptable performance in
                 model checking, and giving a summary of the properties
                 that we were able to check. We consider the paper as a
                 data point that provides reason for optimism about the
                 potential for successful application of model checking
                 to software systems. In addition, our experiences
                 provide a basis for characterizing features that would
                 be especially suitable for model checkers built
                 specifically for analyzing software systems. The intent
                 of this paper is to evaluate symbolic model checking of
                 state-machine based specifications, not to evaluate the
                 TCAS II specification. We used a preliminary version of
                 the specification, the version 6.00, dated March, 1993,
                 in our study. We did not have access to later versions,
                 so we do not know if the properties identified here are
                 present in later versions.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Gunter:1996:ADB,
  author =       "Carl A. Gunter",
  title =        "Abstracting dependencies between software
                 configuration items",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "6",
  pages =        "167--178",
  month =        nov,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/250707.239129",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:17 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This paper studies an abstract model of dependencies
                 between software configuration items based on a theory
                 of concurrent computation over a class of Petri nets.
                 The primary goal is to illustrate the descriptive power
                 of the model and lay theoretical groundwork for using
                 it to design software configuration maintenance tools
                 or model software configurations. As a start in this
                 direction, the paper analyzes and addresses certain
                 limitations in make description files using a form of
                 abstract interpretation.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Darimont:1996:FRP,
  author =       "Robert Darimont and Axel van Lamsweerde",
  title =        "Formal refinement patterns for goal-driven
                 requirements elaboration",
  journal =      j-SIGSOFT,
  volume =       "21",
  number =       "6",
  pages =        "179--190",
  month =        nov,
  year =         "1996",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/250707.239131",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:17 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Requirements engineering is concerned with the
                 identification of high-level goals to be achieved by
                 the system envisioned, the refinement of such goals,
                 the operationalization of goals into services and
                 constraints, and the assignment of responsibilities for
                 the resulting requirements to agents such as humans,
                 devices and programs. Goal refinement and
                 operationalization is a complex process which is not
                 well supported by current requirements engineering
                 technology. Ideally some form of formal support should
                 be provided, but formal methods are difficult and
                 costly to apply at this stage. This paper presents an
                 approach to goal refinement and operationalization
                 which is aimed at providing constructive formal support
                 while hiding the underlying mathematics. The principle
                 is to reuse generic refinement patterns from a library
                 structured according to strengthening/weakening
                 relationships among patterns. The patterns are once for
                 all proved correct and complete. They can be used for
                 guiding the refinement process or for pointing out
                 missing elements in a refinement. The cost inherent to
                 the use of a formal method is thus reduced
                 significantly. Tactics are proposed to the requirements
                 engineer for grounding pattern selection on semantic
                 criteria. The approach is discussed in the context of
                 the multi-paradigm language used in the KAOS method;
                 this language has an external semantic net layer for
                 capturing goals, constraints, agents, objects and
                 actions together with their links, and an inner formal
                 assertion layer that includes a real-time temporal
                 logic for the specification of goals and constraints.
                 Some frequent refinement patterns are high-lighted and
                 illustrated through a variety of examples. The general
                 principle is somewhat similar in spirit to the
                 increasingly popular idea of design patterns, although
                 it is grounded on a formal framework here.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Tracz:1997:SPS,
  author =       "Will Tracz",
  title =        "{SIGSOFT} policy statement for conferences and
                 workshops sponsored by {SIGSOFT}",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "1",
  pages =        "3--4",
  month =        jan,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/251759.251769",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:19 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Schauer:1997:EFI,
  author =       "Helmut Schauer",
  title =        "{ESEC97\slash FSE5} invitation",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "1",
  pages =        "6",
  month =        jan,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/251759.251778",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:19 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Sears:1997:WGH,
  author =       "Andrew Sears",
  title =        "Working group on {HCI} education (identifying \&
                 disseminating resources)",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "1",
  pages =        "6",
  month =        jan,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/251759.251773",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:19 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Taylor:1997:IPU,
  author =       "Richard Taylor",
  title =        "{ICSE} 97 program update",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "1",
  pages =        "7",
  month =        jan,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/251759.251781",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:19 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Doernhoefer:1997:SNSa,
  author =       "Mark Doernhoefer",
  title =        "Surfing the net for {{\booktitle{Software Engineering
                 Notes}}}",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "1",
  pages =        "8--12",
  month =        jan,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/251759.251785",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:19 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Kitchenham:1997:ESEa,
  author =       "Barbara Ann Kitchenham and Lindsay Jones",
  title =        "Evaluating software engineering methods and tool part
                 5: the influence of human factors",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "1",
  pages =        "13--15",
  month =        jan,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/251759.251790",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:19 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "In previous articles, we have considered a number of
                 general issues concerned with evaluating methods and
                 tools. In the next few articles we describe how to
                 perform a specific type of evaluation exercise called
                 Feature Analysis. This article discusses the principles
                 of feature analysis and describes how to identify
                 features and establish a means of scoring products
                 against those features. Later articles consider how to
                 plan a feature-based evaluation and how to analyze the
                 results of an evaluation.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Neumann:1997:RPCa,
  author =       "Peter G. Neumann",
  title =        "Risks to the public in computers and related systems",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "1",
  pages =        "16--22",
  month =        jan,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/251759.251795",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:19 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Garlan:1997:SPM,
  author =       "David Garlan",
  title =        "{SIGSOFT'96} post mortem",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "1",
  pages =        "23",
  month =        jan,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/251759.251812",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:19 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Notkin:1997:FSS,
  author =       "David Notkin",
  title =        "{FSE} 96 special session: novel notions, wild ideas,
                 and fun flames",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "1",
  pages =        "23--24",
  month =        jan,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/251759.251813",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:19 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Montangero:1997:RFE,
  author =       "Carlo Montangero",
  title =        "Report on the {Fifth European Workshop on Software
                 Process Technology}",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "1",
  pages =        "24--27",
  month =        jan,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/251759.251816",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:19 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This is a short resume of the actual proceedings of
                 the fifth European Workshop on Software Process
                 Technology, held in Nancy, 9-11 October 1996. It is a
                 post-hoc integration of the report that is included in
                 the proceedings of the fourth International Conference
                 on the Software Process, held in Brighton, UK, 3-5
                 December 1996, and published by IEEE Press. It is based
                 on the presentations of the session rapporteurs, whom I
                 gratefully acknowledge, together with E. Ellmer, who
                 took minutes of the last wrap-up session. The papers
                 that triggered the discussions are available by
                 Springer Verlag, as volume 1149 of the Lecture Notes in
                 Computer Science.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Sitaraman:1997:FIC,
  author =       "Murali Sitaraman",
  title =        "Fourth international conference on software reuse
                 {(ICSR4)}",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "1",
  pages =        "27",
  month =        jan,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/251759.251821",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:19 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Sheth:1997:RNW,
  author =       "Amit Sheth and Dimitrios Georgakopoulos and Stef M. M.
                 Joosten and Marek Rusinkiewicz and Walt Scacchi and
                 Jack Wileden and Alexander L. Wolf",
  title =        "Report from the {NSF Workshop on Workflow and Process
                 Automation in Information Systems}",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "1",
  pages =        "28--38",
  month =        jan,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/251759.251825",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:19 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "An interdisciplinary research community needs to
                 address challenging issues raised by applying workflow
                 management technology in information systems. This
                 conclusion results from the NSF workshop on Workflow
                 and Process Automation in Information Systems which was
                 held at the State Botanical Garden of Georgia during
                 May 8-10, 1996. The workshop brought together active
                 researchers and practitioners from several communities,
                 with significant representation from database and
                 distributed systems, software process and software
                 engineering, and computer supported cooperative work.
                 The presentations given at the workshop are available
                 in the form of an electronic proceedings of this
                 workshop at http://lsdis.cs.uga.edu/activities/. This
                 report is the joint work of selected representatives
                 from the workshop and it documents the results of
                 significant group discussions and exchange of ideas.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Spanoudakis:1997:VIW,
  author =       "George Spanoudakis and Anthony Finkelsteiin and
                 Wolfgang Emmerich",
  title =        "{Viewpoints 96: International Workshop on Multiple
                 Perspectives in Software Development (SIGSOFT 96)}
                 workshop report",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "1",
  pages =        "39--41",
  month =        jan,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/251759.251832",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:19 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Wolf:1997:SSI,
  author =       "Alexander L. Wolf",
  title =        "Succeedings of the {Second International Software
                 Architecture Workshop (ISAW-2)}",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "1",
  pages =        "42--56",
  month =        jan,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/251759.251844",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:19 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Interest in software architecture as an area of
                 research, education, and practice within software
                 engineering has been growing steadily over the past
                 decade. Software architecture is concerned with the
                 principled study of large-grained software components,
                 including their properties, relationships, and patterns
                 of combination. It is becoming clear that one key to
                 the effective development, operation, and evolution of
                 software systems is the design and evaluation of
                 appropriate architectures. As a complement to the
                 Fourth Symposium on the Foundations of Software
                 Engineering (FSE-4), whose theme was software
                 architecture, the Second International Software
                 Architecture Workshop (ISAW-2) brought together
                 practitioners and researchers for two intense days of
                 discussion and work. The ISAW-2 proceedings [6] were
                 published in the Joint Proceedings of the SIGSOFT '96
                 Workshops, ACM Press, ISBN 0-89791-867-3. The
                 participants were organized into three parallel working
                 groups each focused on a different topic within
                 software architecture. * Styles and Patterns ---
                 Techniques and models for centering software
                 architecture activities on generally useful design
                 methods, components, and assemblages of components. *
                 Architecture Description --- Languages and methods for
                 the capture of architectural designs. * Tools and
                 Methods --- Automated aids for designing, evaluating,
                 validating, implementing, and evolving software
                 architectures. Tying these work groups together was the
                 use of a common case study derived from a real-world
                 architecture found in industry. Each working group
                 studied this architecture from its particular
                 perspective and, to a greater or lesser extent, used
                 the case study to organize their discussions. It is
                 interesting to note, for example, that the three groups
                 created specialized depictions of the architecture for
                 their discussion (see figures 6, 8, and 10). The case
                 study was the architecture of the Call Center Customer
                 Care (C4) System, which was developed by Andersen
                 Consulting. A description of the architecture and some
                 of its more interesting challenges appears in Section
                 2. It is reproduced here in the hopes that it might be
                 prove of continued use to the community. Also appearing
                 here are reports from each working group. The Styles
                 and Patterns Working Group was led by Frances Paulisch,
                 of Siemens, and Mary Shaw, of CMU. The group tried to
                 uncover the styles and patterns that underlay various
                 components of the C4 architecture. In the process, they
                 defined a new kind of architectural style that they
                 named the Data Ooze. The Architectural Description
                 Working Group was led by Paul Clements, of the SEI, and
                 Jeff Magee, of Imperial College. The group concentrated
                 on identifying critical aspects of architectures that
                 require description and on identifying important areas
                 where further work in architectural description is
                 needed. The Tools and Methods Working group was led by
                 William Griswold, of UCSD, and Philippe Kruchten, of
                 Rational. The group pretended to go through a
                 development cycle for the C4 system in order to uncover
                 various architectural tool and method needs. At the
                 conclusion of the workshop, the working group chairs
                 held a panel session in which each group asked a
                 ``challenge'' question of the other two groups. The
                 questions and responses appear in Section 5.2. We hope
                 that these succeedings capture at least some essence of
                 the very fruitful discussion that occurred at the
                 workshop. Of course, this report cannot replace the
                 benefits of actual attendance. The workshop will indeed
                 continue, and we hope that the reader will be
                 interested in attending a future ISAW.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{vandenBrand:1997:RES,
  author =       "M. G. J. van den Brand and P. Klint and C. Verhoef",
  title =        "Reverse engineering and system renovation --- an
                 annotated bibliography",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "1",
  pages =        "57--68",
  month =        jan,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/251759.251849",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:19 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "To facilitate research in the field of reverse
                 engineering and system renovation we have compiled an
                 annotated bibliography. We put the contributions not
                 only in alphabetical order but also grouped by topic so
                 that readers focusing on a certain topic can read their
                 annotations in the alphabetical listing. We also
                 compiled an annotated list of pointers to information
                 about reverse engineering and system renovation that
                 can be reached via Internet. For the sake of ease we
                 also incorporated a brief introduction to the field of
                 reverse engineering.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Francalanci:1997:IIR,
  author =       "C. Francalanci and A. Fuggetta",
  title =        "Integrating information requirements along processes:
                 a survey and research directions",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "1",
  pages =        "68--74",
  month =        jan,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/251759.251864",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:19 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Information requirements have traditionally been
                 collected separately for different business functions
                 and then integrated into an overall specification. The
                 recent orientation to a process perspective in managing
                 business activities has emphasized early integration,
                 by concurrently analyzing business processes and
                 information requirements. Accordingly, information
                 requirements analysis methodologies should take into
                 account these new integration needs. In the paper, we
                 discuss these new integration needs. Traditional
                 methods for requirements integration from database
                 design are analyzed and unfulfilled integration needs
                 are highlighted. Then, other research fields are
                 surveyed that dealt with problems similar to
                 integration and offer interesting results: Recent
                 developments in database design, software engineering
                 and requirements reuse. Finally, we compare the
                 different contributions and indicate open research
                 directions.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Putkonen:1997:CTS,
  author =       "A. Putkonen and M. Kiekara",
  title =        "A case-tool for supporting navigation in the class
                 hierarchy",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "1",
  pages =        "77--84",
  month =        jan,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/251759.251871",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:19 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The central role that class hierarchy plays in
                 object-oriented systems is discussed. The study focuses
                 on design and maintenance stages where the requirements
                 of navigation facilities are greater than at other
                 stages of the systems lifecycle. It will be shown that
                 different kinds of navigation are needed and it is
                 necessary to browse up and down the class hierarchy
                 before it is possible to decide which classes have to
                 be changed. A flexible navigation tool which can
                 support these design and maintenance stages is also
                 presented. The tool helps the designer to navigate the
                 class hierarchy and to investigate the effect of the
                 intended changes on the entire class hierarchy.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Drori:1997:TPH,
  author =       "Offer Drori",
  title =        "From theory to practice or how not to fail in
                 developing information systems",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "1",
  pages =        "85--87",
  month =        jan,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/251759.251875",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:19 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The development of information systems consists of a
                 wide variety of activities and processes, which come
                 together to create a product designed for a specific
                 purpose. We often encounter products that do not serve
                 the purpose they were intended for, and the question
                 asked is: How does it happen that a process that has
                 been defined and structured in principle, has such a
                 high failure ratio? The purpose of this article is to
                 attempt to clarify the problematic points or subjects
                 that exist in the process of developing information
                 systems and to supply the tools to help reduce the
                 problem.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Raccoon:1997:FYP,
  author =       "L. B. S. Raccoon",
  title =        "Fifty years of progress in software engineering",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "1",
  pages =        "88--104",
  month =        jan,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/251759.251878",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:19 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "In this paper, I describe a new outlook on the history
                 of Software Engineering. I portray large-scale
                 structures within Software Engineering to give a better
                 understanding of the flow of history. I use these
                 large-scale structures to reveal the steady, ongoing
                 evolution of concepts, and show how they relate to the
                 myriad whorls and eddies of change. I also have four
                 smaller, more specific purposes in writing this paper.
                 First, I want to point out that old ideas do not die.
                 In The Mythical Man-Month after 20 Years, Brooks claims
                 ``the Waterfall Model is Wrong.'' But if the Waterfall
                 model were wrong, we would stop arguing over it. Though
                 the Waterfall model may not describe the whole truth,
                 it describes an interesting structure that occurs in
                 many well-defined projects and it will continue to
                 describe this truth for a long time to come. I expect
                 the Waterfall model will live on for the next one
                 hundred years and more. Second, I want to show that the
                 Chaos model, Chaos life cycle, Complexity Gap, and
                 Chaos strategy are part of the natural evolution of
                 Software Engineering. The Chaos model and strategy
                 supersede, but do not contradict, the Waterfall and
                 Spiral models, and the Stepwise Refinement strategy.
                 They are more up to date because they express
                 contemporary issues more effectively, and fit our
                 contemporary situations better. The Chaos model, life
                 cycle, and strategy are equally as important, but not
                 better than, other concepts. Third, I compare the Chaos
                 model, life cycle, and strategy to other models, life
                 cycles, and strategies. This paper can be considered a
                 comparison of the ideas presented in my papers about
                 chaos with other ideas in the field. I avoided
                 comparisons in my other papers because I wanted to
                 define those ideas in their own terms and the
                 comparisons did not further the new ideas. Fourth, I
                 make a few predictions about the next ten years of
                 Software Engineering. The large-scale structures
                 described in this history provide a stronger base for
                 understanding how software engineering will evolve in
                 the future. This paper is laid out as follows. In the
                 first section, I use the flow of water as a metaphor to
                 describe the flow of progress in Software Engineering.
                 I use the Water metaphor to show some of the structures
                 within Software Engineering. The current work builds on
                 top of the historical work, and future work will build
                 on top of current work. In the remaining sections, I
                 describe the waves, streams, and tides that portray the
                 evolution of concepts and technologies in Software
                 Engineering.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Ayers:1997:BRP,
  author =       "Michael Ayers",
  title =        "Book Reviews: {{\booktitle{Prototyping with Objects}},
                 Philippe Krief}",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "1",
  pages =        "105--106",
  month =        jan,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/251759.565699",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:19 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Doernhoefer:1997:BROa,
  author =       "Mark Doernhoefer",
  title =        "Book Reviews: {{\booktitle{Object-Oriented Systems
                 Design: an Integrated Approach}}, Edward Yourdon}",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "1",
  pages =        "106--107",
  month =        jan,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/251759.565700",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:19 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Doernhoefer:1997:BROb,
  author =       "Mark Doernhoefer",
  title =        "Book Reviews: {{\booktitle{Object-Oriented Systems
                 Design: an Integrated Approach}}, Edward Yourdon}",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "1",
  pages =        "106--107",
  month =        jan,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/251759.567243",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:19 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{OLaughlin:1997:BRD,
  author =       "Brian O'Laughlin",
  title =        "Book Reviews: {{\booktitle{Dictionary of Object
                 Technology}}, Donald G. Firesmith and Edward M.
                 Eykholt}",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "1",
  pages =        "107--108",
  month =        jan,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/251759.567244",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:19 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{OLaughlin:1997:BRO,
  author =       "Brian O'Laughlin",
  title =        "Book Reviews: {{\booktitle{Object Oriented Compiler
                 Construction}}, Jim Holmes}",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "1",
  pages =        "108--108",
  month =        jan,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/251759.567245",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:19 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Raynham:1997:BRP,
  author =       "Peter Raynham",
  title =        "Book Reviews: {{\booktitle{Programming from
                 Specifications}}, Second Edition, Carroll Morgan}",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "1",
  pages =        "108--109",
  month =        jan,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/251759.567246",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:19 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Person:1997:BRW,
  author =       "Suzette Person",
  title =        "Book Reviews: {{\booktitle{What Every Software Manager
                 MUST KNOW TO SUCCEED With Object Technology}}, John
                 Williams}",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "1",
  pages =        "109--109",
  month =        jan,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/251759.567247",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:19 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Nord:1997:SSA,
  author =       "Robert L. Nord",
  title =        "System and software architecture track third {IEEE}
                 International Conference on Engineering of Complex
                 Computer Systems {(ICECCS'97)}",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "2",
  pages =        "5",
  month =        mar,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/251880.251886",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:21 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Poulin:1997:SSR,
  author =       "Jeff Poulin",
  title =        "Symposium on Software Reuse information",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "2",
  pages =        "5",
  month =        mar,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/251880.251884",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:21 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Dovenbarger:1997:STC,
  author =       "Dana Dovenbarger",
  title =        "Software Technology Conference information",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "2",
  pages =        "6",
  month =        mar,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/251880.251890",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:21 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Rementeria:1997:SPO,
  author =       "Santiago Rementeria",
  title =        "Software process in the organizational context: more
                 data on {European} practices",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "2",
  pages =        "6--7",
  month =        mar,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/251880.251894",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:21 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Doernhoefer:1997:SNSb,
  author =       "Mark Doernhoefer",
  title =        "Surfing the net for {{\booktitle{Software Engineering
                 Notes}}}",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "2",
  pages =        "8--15",
  month =        mar,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/251880.251908",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:21 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Kitchenham:1997:ESEb,
  author =       "Barbara Ann Kitchenham and Lindsay Jones",
  title =        "Evaluating software engineering methods and tools part
                 6: identifying and scoring features",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "2",
  pages =        "16--18",
  month =        mar,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/251880.251912",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:21 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This article discusses the issues involved in
                 selecting the list of features that will be used in a
                 particular feature analysis evaluation exercise. We
                 also consider candidate methods/tools can be evaluated
                 by scoring them in terms of their provision of and
                 support for features that are important to the users of
                 technology.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Neumann:1997:RPCb,
  author =       "Peter G. Neumann",
  title =        "Risks to the public in computers and related systems",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "2",
  pages =        "19--24",
  month =        mar,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/251880.251918",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:21 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Sockut:1997:IDI,
  author =       "Gary H. Sockut and Helen P. Arzu and Robert W.
                 Matthews and David E. Shough",
  title =        "Issues in designing an information model for
                 application development",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "2",
  pages =        "25--34",
  month =        mar,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/251880.251921",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:21 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "IBM's object-oriented information model lets a
                 customer share data among various tools for application
                 development. This paper discusses several issues in
                 designing the information model, namely (1) techniques
                 for diagrams (an essential part of communication
                 between an information model designer and other
                 designers or tool writers), (2) organization of the
                 design of the information model (an essential step when
                 many designers design anything large), and (3)
                 technical content. These discussions of the experience
                 of designing the information model should be valuable
                 for further design of the information model and for
                 other design efforts, e.g., involving other models or
                 other integration of tools.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Lam:1997:PRU,
  author =       "W. Lam",
  title =        "Process reuse using a template approach: a case-study
                 from avionics",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "2",
  pages =        "35--38",
  month =        mar,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/251880.251924",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:21 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This paper reports on the practical reuse of
                 requirements engineering processes for aero-engine
                 control systems. An approach is presented which uses
                 templates to model typical activities in a process,
                 where a process execution is seen as the instantiation
                 of the template. The paper begins with the motivations
                 for process reuse, and then describes aspects of the
                 template approach in greater detail. The lessons learnt
                 about process reuse based on our experience are
                 summarised. The paper concludes with an early
                 evaluation on the practicality of the approach, and
                 highlights areas of further work.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Mathalone:1997:BBM,
  author =       "Sigal Mathalone",
  title =        "A behaviorally-based methodology for modeling system
                 specifications",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "2",
  pages =        "39--42",
  month =        mar,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/251880.251925",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:21 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The Behaviorally-Based Methodology (BBM), a
                 methodology for modeling behaviorally-complex system
                 requirements specifications, is introduced in this
                 paper. The BBM provides guidelines for a
                 Behaviorally-Based decomposition beginning at the first
                 stage of system development, while placing the emphasis
                 on system behavior and providing notations to represent
                 this behavior. In Behaviorally-Based system modeling,
                 all active services and system behavior at each instant
                 are presented in one place (the relevant system state).
                 Hence, problem domain information is more easily
                 carried through the analysis phase allowing for a clear
                 separation between system analysis and system design.
                 In addition, inconsistencies in describing system
                 behavior can be avoided more easily; where such
                 problems occur they are detected and resolved with
                 greater facility. The BBM is compared to more
                 functional approaches, such as Hatley and Pirbhai's
                 approach [1], highlighting the BBM's advantages. An
                 experiment conducted in a graduate software engineering
                 class is described. The experiment has shown that
                 system modeling performance was significantly improved,
                 in both accuracy and speed, when following the BBM.
                 These design benefits of the BBM are then discussed and
                 illustrated.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Law:1997:ODT,
  author =       "Rob Law",
  title =        "An overview of debugging tools",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "2",
  pages =        "43--47",
  month =        mar,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/251880.251926",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:21 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This paper reviews empirical studies on debugging
                 models and the findings associated with these models.
                 There is a discussion on the evolution of program
                 slicing applied to program debugging and different
                 generations of debugging tools are analyzed and
                 criticized. Finally, a programming environment section
                 provides examples of program maintenance tools.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Gambhir:1997:UDA,
  author =       "S. S. Gulu Gambhir",
  title =        "Use of domain analysis to implement the developer
                 off-the-shelf systems {(DOTSS)} system acquisition
                 approach",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "2",
  pages =        "48--53",
  month =        mar,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/251880.251927",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:21 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This paper discusses implementation of Eisner's
                 Developer Off-the-Shelf Systems (DOTSS) system
                 acquisition approach. The DOTSS method involves reuse
                 of entire systems rather than reuse of modules or
                 subsystems. Reuse issues, including methods, benefits,
                 and obstacles as they relate to the DOTSS approach, are
                 presented. The use of Domain Analysis is proposed as a
                 means of developing a set of high-level system
                 requirements that are not overly specific to the
                 problem domain at hand, thereby allowing existing
                 systems from related domains to be considered for
                 reuse. A set of evaluation criteria that can be used to
                 differentiate candidate systems is also included.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Aggarwal:1997:TCI,
  author =       "K. K. Aggarwal",
  title =        "A tool for the collection of industrial software
                 metrics data",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "2",
  pages =        "54--57",
  month =        mar,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/251880.251929",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:21 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "A tool has been designed under Windows 3.1, which
                 converts a 'C' software to its abridged version that
                 lists program characteristics of interest to the metric
                 researchers. These characteristics may be operators,
                 operands lists, their frequency of occurrences, number
                 of terminators, different types of control structures,
                 internal and external variables, etc. This information
                 may be useful for the researchers but prevents the
                 reconstruction of the original source code.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Blanqui:1997:DCA,
  author =       "Fr{\'e}d{\'e}ric Blanqui",
  title =        "A document-centered approach for an open {CASE}
                 environment framework connected with the {World-Wide
                 Web}",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "2",
  pages =        "58--63",
  month =        mar,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/251880.251933",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:21 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Software development suffers from a number of well
                 known difficulties, both technical and managerial [2].
                 A technical approach that could help to reduce them is
                 the use of Computer-Aided Software Engineering (CASE)
                 technologies. However, current Integrate Project
                 Support Environment (IPSE) frameworks impose many
                 constraints on CASE tool vendors, and this has impeded
                 their adoption [10]. A more incremental strategy should
                 be considered for the transfer and the diffusion of
                 those technologies. This paper describes a
                 document-centered approach and a simple but extendable
                 system called Open Software Development System (OSDS)
                 based on this approach. First, we describe difficulties
                 inherent in the management of documents involved in
                 software development. Second, we define some
                 requirements to address those difficulties. Finally, we
                 describe the important features of OSDS; these include
                 an extension of Mosaic [3] that enables anyone with
                 network access to connect to an OSDS, browse through
                 it, and automatically integrate some documents into
                 his/her own system.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Kelsey:1997:IDT,
  author =       "Robert Bruce Kelsey",
  title =        "Integrating a defect typology with containment
                 metrics",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "2",
  pages =        "64--67",
  month =        mar,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/251880.251947",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:21 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Software metrics are numerous and varied, but they are
                 typically disjoint and seldom directly support defect
                 causal analysis. Diagnosing problems in the development
                 process is certainly possible with disjoint metrics,
                 but the task is greatly simplified if at least a subset
                 of the metrics used are both applicable throughout the
                 development cycle and oriented towards causal analysis
                 of process deficiencies. This paper describes one such
                 set of metrics, the integration of phase containment
                 metrics with a modified defect typology drawn from the
                 traditional inspection checklist. The result is a
                 defect typology that identifies not only coding errors
                 but deficiencies in the procedures used to develop and
                 qualify the product.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Marovac:1997:SDE,
  author =       "Nenad Marovac",
  title =        "Software development environment based on {HyperNet}",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "2",
  pages =        "68--71",
  month =        mar,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/251880.251954",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:21 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "In supporting groups working on development of large
                 software programs we identify three classes of tools:1.
                 CASE tools: tools which are used directly in the
                 program development (specification, design,
                 implementation, and testing).2. environment tools:
                 tools which together are and effect the development
                 environment, i.e. tools used in organizing and
                 maintaining development information (program
                 specifications, designs, code, test cases, etc.) which
                 may be distributed world-wide.3. groupware tools: tools
                 which are used to effect group communication and
                 interaction, i.e. tools used for submission,
                 organization and distribution of ideas and any issues
                 related to the development and management process. In
                 this paper we will address the second class of tools,
                 the environment tools, and present an environment
                 largely based on HyperNet --- A tool to choreograph
                 world wide distributed hypermedia documents. The
                 environment incorporates three main functionalities:1.
                 A project knowledge base and associated processor. The
                 knowledge base stores all material relevant to a
                 project, i.e. specification, design, implementation,
                 testing and maintenance related documents and source
                 code for the project including operating system scripts
                 required to compile, link, execute and test the
                 software.2. mechanism supporting libraries of reusable
                 material. The material includes program specifications,
                 design documents, code and test data and procedures.3.
                 documentation processor which produces on-demand
                 documentation for the project on any desirable level of
                 detail.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Bing:1997:OBM,
  author =       "Mao Bing and Xie Li",
  title =        "An object-based model for prototyping user interfaces
                 of cooperative systems",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "2",
  pages =        "72--76",
  month =        mar,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/251880.251966",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:21 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This paper presents an object-based model to support
                 the construction of user interfaces of CSCW systems.
                 The model divides a cooperative system into layers and
                 each layer is formed by component objects. A principal
                 focus of the model is the provision of an object
                 linking mechanism which links the relevant objects in
                 the same interactive layers of multiple users to
                 realize multi-level collaboration which is independent
                 of the application. In addition, multi-level
                 collaboration obtains fine-grained collaboration of the
                 cooperative system and improves its collaboration
                 efficiency. The object-based method used in this paper
                 ensures a structured collaboration, realizes a simple
                 collaboration management, and facilitates cooperative
                 system development.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Gintell:1997:LLA,
  author =       "John W. Gintell and G{\'e}rard Memmi",
  title =        "Lessons learned with {ACME} an environment integration
                 experiment",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "2",
  pages =        "77--81",
  month =        mar,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/251880.251985",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:21 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "ACME is an integration experiment with Marvel (a
                 process centered environment) and ConversationBuilder
                 (a CSCW system). Scrutiny, a collaborative software
                 inspection system built with ConversationBuilder, is
                 the subject application that operates in the integrated
                 environment. The integration methodologies used by ACME
                 are control integration, data integration, and tool
                 integration. This paper describes the components and
                 conceptual design of ACME and the effect that ACME has
                 on the operation of Scrutiny. It also describes the
                 lessons learned during this project. These lessons are
                 categorized into those concerned with concept
                 validation, integration issues, system design issues,
                 software agent integration, and implementation and
                 testing issues.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Rosen:1997:PCS,
  author =       "Clive Rosen",
  title =        "{PLUNGE DA}: a case study",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "2",
  pages =        "82--83",
  month =        mar,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/251880.251986",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:21 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Dowson:1997:ASF,
  author =       "Mark Dowson",
  title =        "The Ariane 5 software failure",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "2",
  pages =        "84",
  month =        mar,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/251880.251992",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:21 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Blyth:1997:IAM,
  author =       "Andrew Blyth",
  title =        "Issues arising from medical system's failure",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "2",
  pages =        "85--86",
  month =        mar,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/251880.251994",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:21 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "As more health-care providers adopt and utilise
                 information technology in the treatment of there
                 patients, so the number of system failures increases.
                 Analysis of these failures shows us that these systems
                 are failing for a variety of technical and social
                 reason. The question that we are forced to ask is Why?
                 In this paper I seek to highlight some of the problems
                 that are currently facing developers and users of
                 medical computing systems.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Morzenti:1997:ATA,
  author =       "Angelo Morzenti and Fabio A. Schreiber",
  title =        "Analysis of techniques in the assessment of
                 ultra-reliable computerized systems",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "2",
  pages =        "87--91",
  month =        mar,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/251880.251998",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:21 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "A wide gap exists between the dependability figures,
                 required by standardization committees for
                 life-critical computer applications, and the current
                 state-of-art in techniques to provide and assess them.
                 In this paper we make a quick review of the best suited
                 methodologies for each phase of the system life-cycle.
                 We argue that the traditional view, which distinguishes
                 between the behaviour of hardware and software
                 components, should be clarified by separating the
                 logical activities in the specification and in the
                 design phases, which can be related both to hardware
                 and to software, and the physical defects and operation
                 stress, which only affect hardware.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Greenwood:1997:MAL,
  author =       "Garrison W. Greenwood",
  title =        "So many algorithms. So little time",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "2",
  pages =        "92--93",
  month =        mar,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/251880.252002",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:21 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This paper discusses the futility in answering
                 questions about convergence and performance in
                 algorithms used to solve optimization problems. Not
                 only are these answers difficult to obtain, they are
                 often times meaningless.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{LeBissonnais:1997:MDR,
  author =       "Marc {Le Bissonnais} and Fran{\c{c}}ois Prunet",
  title =        "From manufacturing document requirements to customized
                 authoring and automated publishing framework",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "2",
  pages =        "94--98",
  month =        mar,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/251880.252004",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:21 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The aim of this paper is a working-out of an open
                 authoring framework for an automated documentation
                 process binded with an object manufacturing-specific
                 engineering framework. Using standards close together
                 to support product documentation as part of the
                 life-cycle of manufactured products is becoming an
                 actual and urgent topic for industry. Indeed, this area
                 leads people to describe very complex systems, but it
                 uses different models, based on many standards, to be
                 handled together during the life cycle steps of these
                 systems. A customizable automated authoring and
                 publishing framework trying to take into account some
                 multimedia research aspects should make the work easier
                 for the designers of such manufacturing systems,
                 allowing them to follow the design process and to have
                 a better communication. We contribute to the problem by
                 using an object-oriented approach providing
                 structuration, abstraction, re-use and easier upgrading
                 based upon textual and graphical modes through the
                 integration and merging of domain models with object
                 services like customized editors, browsers and
                 parsers.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Finkbine:1997:BIU,
  author =       "Robert B. Finkbine",
  title =        "Barriers to Institutionalizing Using Current Tools and
                 Environments: an Introduction to Functional Programming
                 Systems Using {Haskell}",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "2",
  pages =        "99",
  month =        mar,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/251880.566085",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:21 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Kelsey:1997:BRE,
  author =       "Robert Bruce Kelsey",
  title =        "Book Review: {{\booktitle{Education for an Information
                 Age: Teaching in the Computerized Classroom}}}",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "2",
  pages =        "99",
  month =        mar,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/251880.566086",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:21 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Doernhoefer:1997:BROc,
  author =       "Mark Doernhoefer",
  title =        "Book Review: {{\booktitle{Object-Oriented Development
                 Process and Metrics}}}",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "2",
  pages =        "100",
  month =        mar,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/251880.566087",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:21 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Raynham:1997:BRB,
  author =       "Peter Raynham",
  title =        "Book Review: Book Two of {{\booktitle{Object Oriented
                 Knowledge: The Working Object}}}",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "2",
  pages =        "101--102",
  month =        mar,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/251880.566088",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:21 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Suryanarayana:1997:BRO,
  author =       "Manjunath Suryanarayana",
  title =        "Book Review: {{\booktitle{Object-Orientation and
                 Prototyping in Software Engineering}}}",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "2",
  pages =        "102",
  month =        mar,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/251880.566089",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:21 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Tracz:1997:BRA,
  author =       "Will Tracz",
  title =        "Book Review: {{\booktitle{The Art of Systems
                 Architecting}}}",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "2",
  pages =        "102",
  month =        mar,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/251880.566090",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:21 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Bassett:1997:TPA,
  author =       "Paul G. Bassett",
  title =        "The theory and practice of adaptive reuse",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "3",
  pages =        "2--9",
  month =        may,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/258368.258371",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:24 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Johnson:1997:CFP,
  author =       "Ralph E. Johnson",
  title =        "Components, frameworks, patterns",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "3",
  pages =        "10--17",
  month =        may,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/258368.258378",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:24 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Bronsard:1997:TSP,
  author =       "Fran{\c{c}}ois Bronsard and Douglas Bryan and W.
                 Kozaczynski and Edy S. Liongosari and Jim Q. Ning and
                 {\'A}sgeir {\'O}lafsson and John W. Wetterstrand",
  title =        "Toward software plug-and-play",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "3",
  pages =        "19--29",
  month =        may,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/258368.258379",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:24 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Davis:1997:SAC,
  author =       "Margaret J. Davis and Roger B. Williams",
  title =        "Software architecture characterization",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "3",
  pages =        "30--38",
  month =        may,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/258368.258380",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:24 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{McCoog:1997:MRA,
  author =       "Phillip McCoog and Rick Smith",
  title =        "Mostly reuse: another code sharing option",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "3",
  pages =        "39--43",
  month =        may,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/258368.258382",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:24 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Maeda:1997:OIA,
  author =       "Chris Maeda and Arthur Lee and Gail Murphy and Gregor
                 Kiczales",
  title =        "Open implementation analysis and design",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "3",
  pages =        "44--52",
  month =        may,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/258368.258383",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:24 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Lam:1997:SDA,
  author =       "W. Lam and J. A. McDermid",
  title =        "A summary of domain analysis experience by way of
                 heuristics",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "3",
  pages =        "54--64",
  month =        may,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/258368.258386",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:24 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Jarzabek:1997:MMD,
  author =       "Stan Jarzabek",
  title =        "Modeling multiple domains in software reuse",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "3",
  pages =        "65--74",
  month =        may,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/258368.258387",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:24 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Meekel:1997:DMA,
  author =       "Jacques Meekel and Thomas B. Horton and Robert B.
                 France and Charlie Mellone and Sajid Dalvi",
  title =        "From domain models to architecture frameworks",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "3",
  pages =        "75--80",
  month =        may,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/258368.258389",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:24 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Houdek:1997:QPA,
  author =       "Frank Houdek and Hubert Kempter",
  title =        "Quality patterns --- an approach to packaging software
                 engineering experience",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "3",
  pages =        "81--88",
  month =        may,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/258368.258391",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:24 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Mili:1997:ANC,
  author =       "Hafedh Mili and Estelle Ah-Ki and Robert Godin and
                 Hamid Mcheick",
  title =        "Another nail to the coffin of faceted
                 controlled-vocabulary component classification and
                 retrieval",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "3",
  pages =        "89--98",
  month =        may,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/258368.258393",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:24 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Tracz:1997:DRJ,
  author =       "Will Tracz",
  title =        "Developing reusable {Java} components",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "3",
  pages =        "100--103",
  month =        may,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/258368.258397",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:24 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Hollingsworth:1997:UCD,
  author =       "Jeffrey K. Hollingsworth and Ethan L. Miller",
  title =        "Using content-derived names for configuration
                 management",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "3",
  pages =        "104--109",
  month =        may,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/258368.258399",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:24 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Mili:1997:RQR,
  author =       "Hafedh Mili and Houari Sahraoui and Ilham Benyahia",
  title =        "Representing and querying reusable object frameworks",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "3",
  pages =        "110--120",
  month =        may,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/258368.258401",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:24 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Pastor:1997:UMM,
  author =       "Esteban A. Pastor and R. T. Price",
  title =        "Using metamodels of methodologies to determine the
                 needs for reusability support",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "3",
  pages =        "121--129",
  month =        may,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/258368.258405",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:24 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Thibault:1997:FAG,
  author =       "Scott Thibault and Charles Consel",
  title =        "A framework for application generator design",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "3",
  pages =        "131--135",
  month =        may,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/258368.258408",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:24 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Jimenez-Perez:1997:MSS,
  author =       "Guillermo Jim{\'e}nez-P{\'e}rez and Don Batory",
  title =        "Memory simulators and software generators",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "3",
  pages =        "136--145",
  month =        may,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/258368.258410",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:24 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Villarreal:1997:RGD,
  author =       "E. E. Villarreal and Don Batory",
  title =        "{Rosetta}: a generator of data language compilers",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "3",
  pages =        "146--156",
  month =        may,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/258368.258412",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:24 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Mili:1997:CPM,
  author =       "R. Mili and M. Frappier and J. Desharnais and A.
                 Mili",
  title =        "A calculus of program modifications",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "3",
  pages =        "157--168",
  month =        may,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/258368.258415",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:24 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Maruyama:1997:MAD,
  author =       "Katsuhisa Maruyama and Ken-ichi Shima",
  title =        "A mechanism for automatically and dynamically changing
                 software components",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "3",
  pages =        "169--180",
  month =        may,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/258368.258417",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:24 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Browne:1997:RLI,
  author =       "Shirley V. Browne and James W. Moore",
  title =        "Reuse library interoperability and the World Wide
                 {Web}",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "3",
  pages =        "182--189",
  month =        may,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/258368.258419",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:24 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Medvidovic:1997:RSC,
  author =       "Nenad Medvidovic and Peyman Oreizy and Richard N.
                 Taylor",
  title =        "Reuse of off-the-shelf components in C2-style
                 architectures",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "3",
  pages =        "190--198",
  month =        may,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/258368.258421",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:24 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Karhinen:1997:CDR,
  author =       "Anssi Karhinen and Alexander Ran and Tapio Tallgren",
  title =        "Configuring designs for reuse",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "3",
  pages =        "199--208",
  month =        may,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/258368.258423",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:24 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Guerrieri:1997:IJS,
  author =       "Ernesto Guerrieri and Martin Griss and Doug Lea and
                 Prashant Sridharan and Will Tracz",
  title =        "The impact of {Java} on software reusability",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "3",
  pages =        "210--211",
  month =        may,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/258368.258426",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:24 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Zand:1997:RRD,
  author =       "Mansour Zand and Gillermo Arango and Maggie Davis and
                 Ralph Johnson and Jeffrey S. Poulin and Andrew Watson",
  title =        "Reuse research and development: is it on the right
                 track?",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "3",
  pages =        "212--216",
  month =        may,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/258368.258428",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:24 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Ethics:1997:DSE,
  author =       "{ACM / IEEE-CS Task Force on Software Engineering
                 Ethics and Practice}",
  title =        "Draft software engineering code of ethics, version
                 2.1",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "4",
  pages =        "3--6",
  month =        jul,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/263244.263245",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:25 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Krasner:1997:CRS,
  author =       "Herb Krasner",
  title =        "Clarifying the role of the {SEI}: they do not certify
                 assessors or assessments",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "4",
  pages =        "7",
  month =        jul,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/263244.263247",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:25 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Rada:1997:NSE,
  author =       "Roy Rada and James Schoening",
  title =        "New standards for educational technology",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "4",
  pages =        "9--10",
  month =        jul,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/263244.263248",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:25 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{ONeill:1997:SVA,
  author =       "Don O'Neill",
  title =        "Software value added study",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "4",
  pages =        "11--12",
  month =        jul,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/263244.263249",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:25 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Doernhoefer:1997:SNSc,
  author =       "Mark Doernhoefer",
  title =        "Surfing the net for {{\booktitle{Software Engineering
                 Notes}}}",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "4",
  pages =        "13--20",
  month =        jul,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/263244.263250",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:25 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Kitchenham:1997:ESEc,
  author =       "Barbara Ann Kitchenham",
  title =        "Evaluating software engineering methods and tools,
                 part 7: planning feature analysis evaluation",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "4",
  pages =        "21--24",
  month =        jul,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/263244.263251",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:25 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "When planning a feature analysis based evaluation of a
                 method or tool the following areas should be addressed
                 and included in the evaluation project plan:1. scope of
                 the evaluation,2. basis of the evaluation,3. roles and
                 responsibilities,4. procedures,5. assumptions and
                 constraints made, and6. timescale and effort involved.
                 These are discussed in the following sections.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Neumann:1997:RPCc,
  author =       "Peter G. Neumann",
  title =        "Risks to the public in computers and related systems",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "4",
  pages =        "25--34",
  month =        jul,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/263244.263252",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:25 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Reifer:1997:RAC,
  author =       "Donald J. Reifer",
  title =        "Report: 4th {ACM} Conference On Computer and
                 Communications Security",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "4",
  pages =        "32--33",
  month =        jul,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/263244.773581",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:25 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The 4th ACM Conference on Computer and Communications
                 Security [1] was held on 1-4 April 1997 in Zurich,
                 Switzerland. About 100 participants from around the
                 world gathered to discuss advances being made primarily
                 in the area of defensive information warfare. This was
                 primarily a research-oriented event which attracted
                 principal investigators working in the security field
                 from about 14 nations. I attended the conference for
                 the following four reasons: * I wanted to update my
                 knowledge of the area. * I wanted to ascertain what
                 progress has been made in the field. * I wanted to
                 determine whether there were any breakthrough
                 technologies on the horizon. * I wanted to understand
                 the threats being guarded against and the defensive
                 strategies that leaders in the field were recommending.
                 As I will relate later, significant progress has been
                 in many defensive information warfare areas. I
                 particularly was impressed by the advances that have
                 been made in the area of cryptography, digital
                 signatures and communications protocols. I was
                 disappointed by the perceived lack of progress over the
                 years in the important area of trusted systems and
                 information security infrastructure development. This
                 was the first conference that I have attended on the
                 subject in about a decade. I selected the event because
                 I thought that it would allow me to view both present
                 work in the field and look into the future.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Kim:1997:RBA,
  author =       "Hyoseob Kim",
  title =        "Report on {Bruce Anderson}'s Tutorial on Pattern
                 Languages of Program Design",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "4",
  pages =        "34",
  month =        jul,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/263244.773582",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:25 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Drori:1997:HIC,
  author =       "Offer Drori",
  title =        "Hypertext implications for {CASE} environments",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "4",
  pages =        "35--38",
  month =        jul,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/263244.263253",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:25 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The article discusses hypertext and its use in the
                 development of CASE based information systems.
                 Information systems development is a lengthy process,
                 comprising various phases dealing with different
                 development processes --- from systems analysis, to
                 system characterization and design, and culminating in
                 the setting up of the system and assimilation by users.
                 This is called the information system life cycle. The
                 technology which deals with computerization of the
                 various phases of information systems development is
                 called CASE, or Computer-Aided Software Engineering.
                 The work of the planner and programmer is frequently
                 conducted in different work environments according to
                 the phases of the system life cycle. To date, no
                 computerized interface exists between the various
                 environments, so that, in effect, management of the
                 development phases is partially manual. The aim of this
                 article is to show that a hypertext approach can be
                 used to deal with the current difficulties in
                 CASE-based information systems development. The basic
                 premise of this article is that the CASE system should
                 be viewed as a database, over which an appropriate
                 dynamic hypertext model can then be defined. This
                 approach differs from all other CASE approaches, which
                 view CASE solely as a tool or working environment.
                 Hypertext was developed in recent years to cope with
                 the growing need for computer-aided management of large
                 databases (particularly text-based ones). Hypertext
                 enables the building of a large database and creation
                 of information nodes with links between them, which
                 make it possible to manage and control the many
                 elements dispersed through numerous environments. This
                 article sets out to show that it is possible to harness
                 hypertext to manage many CASE-based work environments,
                 thereby creating a computerized tool which draws
                 together different work environments and enables
                 management and control of its various elements.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Lam:1997:CRA,
  author =       "W. Lam",
  title =        "Creating reusable architectures: initial experience
                 report",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "4",
  pages =        "39--43",
  month =        jul,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/263244.263254",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:25 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Achieving systematic reuse of software designs
                 requires the creation of a reusable software
                 architecture. This paper describes initial experience
                 of creating reusable architectures in the avionics
                 domain. A case-study is presented which illustrates the
                 RACE (Reusable Architecture Creation and Employment)
                 process. In RACE, a variability analysis is used to
                 identify possible variations in a family of systems,
                 which then guides the creation of a generic
                 architecture and a set of architectural ``plug-ins.''
                 The paper concludes with a set of RACE guidelines which
                 summarises our initial experience.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Guo:1997:ATD,
  author =       "Minyi Guo",
  title =        "Automatic transformation from data flow diagram to
                 structure chart",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "4",
  pages =        "44--49",
  month =        jul,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/263244.263255",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:25 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The software development methodologies --- structured
                 analysis and structured design techniques are
                 considered as the most popular and successful. But the
                 process of transforming from structured software
                 specification to structured design document is a
                 challengingly intelligent activity. In this paper, we
                 attempt to solve this problem automatically in our CASE
                 tool, called CAST (Computer-Aided Structured
                 Transformation). We propose a description language as a
                 common machinery for the representation of various
                 structured tools. Two kinds of algorithms which
                 correspond to two structured analysis methods called
                 transform analysis and transaction analysis, used to
                 produce structure charts from data flow diagrams, are
                 presented. The architecture of CAST is also described
                 in the paper.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Agarwal:1997:IIO,
  author =       "Rakesh Agarwal and Giorgio Bruno",
  title =        "Implementing inheritance in operational graphical
                 languages",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "4",
  pages =        "50--55",
  month =        jul,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/263244.263256",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:25 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "System engineering development methods and automation
                 techniques are required to manage the complexity
                 inherent in the design of large computer based systems
                 and to provide an efficient means for reusing the
                 system by means of inheritance. Growing interest is
                 being shown in operational models, i.e. models that can
                 be executed using a suitable support environment. Most
                 operational models are graphical and can be considered
                 as high-level programs which are developed using
                 high-level modeling languages. Generally speaking,
                 while the OO approach has reached a good maturity at
                 the programming level (although differences in
                 individual languages are not negligible) there is no
                 clear consensus on how it can be extended to the design
                 and analysis phases. These artificial discontinuities
                 can be eliminated if a single modeling language is used
                 which is operational. The operational approach
                 eliminates the scope and semantic discontinuities in
                 the development process by using a single, integrated,
                 formal set of modeling abstractions to create a given
                 executable model. It was to address these problems and
                 provide advanced software architectural features, that
                 O$^3$ ML was developed by us. Combining the concept of
                 Operational, OO and Modeling we get a modeling language
                 which we refer to as Operational Object-Oriented
                 Modeling Language (O$^3$ ML) that provides the basic
                 vocabulary used to express both domain knowledge and
                 prototyping ideas.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Srinath:1997:ISB,
  author =       "S. Srinath and K. Venkatesh and D. Janaki Ram",
  title =        "An integrated solution based approach to software
                 development using unified reuse artifacts",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "4",
  pages =        "56--60",
  month =        jul,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/263244.263258",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:25 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Although development processes are considered
                 important in determining the quality of the product,
                 often processes and products are considered as separate
                 entities. This results in loss of information regarding
                 dependencies spanning across processes and products. In
                 this paper we propose a unit called Unified Reuse
                 Artifact (URA) which can represent artifacts of either
                 the ``process'' or the ``product,'' in effect
                 representing an artifact of the ``solution.'' With
                 this, a solution is represented as a directed graph of
                 URAs establishing dependencies in a unified manner.
                 This helps bring in other possibilities like project
                 tracking, deciphering contexts and evolution in a
                 unified way, etc. We then propose a process model
                 oriented towards solutions, and which strives to reuse
                 earlier experiences with the concept of a ``Solution
                 Framework.''",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Chen:1997:RES,
  author =       "Yeh-Ling Chen and Arnold J. Stromberg",
  title =        "Robust estimation in software experiments",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "4",
  pages =        "60--64",
  month =        jul,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/263244.263260",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:25 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "``Software development, like other scientific
                 developments, requires formal experiments with a great
                 deal of plan and analysis if they are to provide
                 meaningful results''[11]. This paper uses examples to
                 extend the discussion to certain statistical analyses,
                 i.e., robust estimation and variance modeling, which
                 are relatively new and may have never been practiced in
                 the software engineering field.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Mugisa:1997:RTS,
  author =       "Ezra K. Mugisa",
  title =        "A reuse triplet for systematic software reuse",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "4",
  pages =        "65--69",
  month =        jul,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/263244.263262",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:25 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "We present the view that for systematic software reuse
                 (SSR) to happen we need a reuse software architecture
                 (RSA) as the invariant base and a collection of reuse
                 software components (RSCs) as the pluggable variant
                 part of a family of architecturally similar software
                 systems. We shall identify a reuse situation with a
                 RSA, RSCs and a plugging operator. SSR is then
                 presented as a case of plugging a collection of RSCs
                 into the appropriate RSA. We apply this view of reuse
                 to a number of reuse cases and find evidence that for
                 reuse to be successful we need simple, clear and easily
                 pluggable RSAs and RSCs.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Ram:1997:POT,
  author =       "D. Janaki Ram and K. N. Anantha Raman and K. N.
                 Guruprasad",
  title =        "A pattern oriented technique for software design",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "4",
  pages =        "70--73",
  month =        jul,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/263244.263265",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:25 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Design patterns can be considered as elements of
                 complex software systems. Crafting these software
                 systems using design patterns calls for a suitable
                 design methodology or technique. Existing design
                 methodologies do not serve this purpose well. This
                 paper proposes a technique which helps in developing
                 software systems using design patterns.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Fink:1997:PBT,
  author =       "George Fink and Matt Bishop",
  title =        "Property-based testing: a new approach to testing for
                 assurance",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "4",
  pages =        "74--80",
  month =        jul,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/263244.263267",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:25 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The goal of software testing analysis is to validate
                 that an implementation satisfies its specifications.
                 Many errors in software are caused by generalizable
                 flaws in the source code. Property-based testing
                 assures that a given program is free of specified
                 generic flaws. Property-based testing uses property
                 specifications and a data-flow analysis of the program
                 to guide evaluation of test executions for correctness
                 and completeness.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Piattini:1997:ASM,
  author =       "Mario G. Piattini and Herv{\'e} Tigr{\'e}at",
  title =        "Applying the {``STUDIO''} method to the interface
                 design of an environmental software system",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "4",
  pages =        "81--83",
  month =        jul,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/263244.263268",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:25 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This paper addresses the application of the STUDIO
                 (STructured User-interface Design for Interaction
                 Optimization) method to the user-interface development
                 of an information system (called ``HIMPPA'') that
                 allows the simulation of heavy-particle dispersion.
                 This method has been proposed in 1994 by D. P. Browne.
                 We have adapted and integrated it with an
                 object-oriented design technique for the HIMPPA project
                 (an ESPRIT-PASO Special Action).",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Wang:1997:TOO,
  author =       "Y. Wang and G. King and I. Court and M. Ross and G.
                 Staples",
  title =        "On testable object-oriented programming",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "4",
  pages =        "84--90",
  month =        jul,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/263244.263270",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:25 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "A new philosophy contributing towards the design of
                 testable object-oriented (OO) software is introduced in
                 this paper. The testing of conventional OO software
                 focuses on the generation of tests for existing objects
                 and systems; the testable object-oriented programming
                 (TOOP) method draws attention to building testabilities
                 into objects and systems during coding or compiling, so
                 that the succeeding processes in test generation and
                 implementation can be simplified. A new method of TOOP
                 is developed to improve the testability of OO software.
                 Software testability at object level and system level
                 is quantitatively modelled. A set of fundamental
                 built-in testable mechanisms oriented to the basic
                 control structures in objects is constructed in order
                 to improve the testability of OO software in terms of
                 test controllability and observability. The most
                 interesting feature obtained by TOOP is that the
                 built-in tests in any objects can be inherited and
                 reused in the same way as that of codes or functions in
                 conventional OO software.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Doernhoefer:1997:BRD,
  author =       "Mark Doernhoefer",
  title =        "Book review: {{\booktitle{Developing Object-Oriented
                 Software An Experienced-Based Approach}} by IBM
                 Object-Oriented Technology Center (PTR Prentice Hall,
                 1997)}",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "4",
  pages =        "113--114",
  month =        jul,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/263244.773583",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:25 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Ives:1997:BRM,
  author =       "Barry L. Ives",
  title =        "Book Review: {{\booktitle{ML for the Working
                 Programmer}} by L. C. Paulson (Cambridge University
                 Press, 1996)}",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "4",
  pages =        "114",
  month =        jul,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/263244.773584",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:25 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Ires:1997:BRU,
  author =       "Barry L. Ires",
  title =        "Book review: {{\booktitle{Using Z}} by Jim Woodcock
                 and Jim Davies (Prentice Hall, 1996)}",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "4",
  pages =        "114--115",
  month =        jul,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/263244.773585",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:25 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Doernhoefer:1997:SNSd,
  author =       "Mark Doernhoefer",
  title =        "Surfing the net for {{\booktitle{Software Engineering
                 Notes}}}",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "5",
  pages =        "5--9",
  month =        sep,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/270849.270850",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:27 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Kitchenham:1997:ESEd,
  author =       "Barbara Ann Kitchenham and Lindsay Jones",
  title =        "Evaluating {SW} Eng. methods and tools, part 8:
                 analysing a feature analysis evaluation",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "5",
  pages =        "10--12",
  month =        sep,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/270849.270851",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:27 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "In the previous articles, we introduced the basic
                 principles of Feature Analysis, its limitations, how to
                 drive a feature list and score features and how to plan
                 a Feature Analysis evaluation. In this article, we look
                 in more detail at the issue of analysing the results of
                 feature analysis and presenting the results of an
                 evaluation.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Neumann:1997:RPCd,
  author =       "Peter G. Neumann",
  title =        "Risks to the public in computers and related systems",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "5",
  pages =        "13--15",
  month =        sep,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/270849.270852",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:27 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Kwon:1997:RS,
  author =       "Oh Cheon Kwon",
  title =        "Report from {SEKE'97}",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "5",
  pages =        "15--16",
  month =        sep,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/270849.270853",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:27 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Edwards:1997:WAW,
  author =       "Stephen H. Edwards and Bruce W. Weide",
  title =        "{WISR8: 8th Annual Workshop on Software Reuse}:
                 summary and working group reports",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "5",
  pages =        "17--32",
  month =        sep,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/270849.270854",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:27 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Waugh:1997:DET,
  author =       "Doug Waugh",
  title =        "Description of {EDCS} technology clusters",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "5",
  pages =        "33--42",
  month =        sep,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/270849.270855",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:27 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Evolutionary Systems are those that are capable of
                 accommodating change over an extended system lifetime
                 with reduced risk and cost/schedule impact. Most of our
                 complex defense systems depend on software for their
                 successful operation and, as a result, the software in
                 those systems is the primary vehicle for adapting to
                 change. The EDCS (Evolutionary Design of Complex
                 Software) Program is providing for the development and
                 experimental application of new software technologies
                 which can enable significant improvements in military
                 mission effectiveness and information superiority. The
                 goal is the capability to produce software intensive
                 military systems that are highly flexible and adaptable
                 to meet changing requirements --- evolutionary systems.
                 In addition to DARPA, the EDCS Program is co-sponsored
                 by USAF Rome Laboratory, USAF Wright Laboratory, US
                 Army Missile Command, and the National Science
                 Foundation (NSF). Technical management is provided
                 jointly by the DoD Software Engineering Institute (SEI)
                 and Rome Laboratory. Rome Laboratory is DARPA's primary
                 contracting agent.EDCS is organized into 5 Technology
                 Clusters:1. Rationale Capture and Software
                 Understanding2. Architecture and Generation3. High
                 Assurance / Real-Time4. Information Management5.
                 Dynamic Languages. This paper contains a short
                 description of each cluster.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Parnas:1997:SEE,
  author =       "David Lorge Parnas",
  title =        "Software engineering (extended abstract): an
                 unconsummated marriage",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "6",
  pages =        "1--3",
  month =        nov,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/267896.267897",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:28 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Rushby:1997:SS,
  author =       "John Rushby",
  title =        "Subtypes for specifications",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "6",
  pages =        "4--19",
  month =        nov,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/267896.267898",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:28 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Boehm:1997:DMA,
  author =       "Barry Boehm and Alex Egyed and Julie Kwan and Ray
                 Madachy",
  title =        "Developing multimedia applications with the {WinWin}
                 spiral model",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "6",
  pages =        "20--39",
  month =        nov,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/267896.267899",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:28 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Maibaum:1997:WWT,
  author =       "Tom S. E. Maibaum",
  title =        "What we teach software engineers in the university: do
                 we take engineering seriously?",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "6",
  pages =        "40--50",
  month =        nov,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/267896.267900",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:28 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Uhl:1997:WWE,
  author =       "J{\"u}rgen Uhl",
  title =        "What we expect from software engineers in the
                 industry",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "6",
  pages =        "51",
  month =        nov,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/267896.267901",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:28 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Kemmerer:1997:SID,
  author =       "Richard A. Kemmerer",
  title =        "Security issues in distributed software",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "6",
  pages =        "52--59",
  month =        nov,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/267896.267902",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:28 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Medvidovic:1997:FCC,
  author =       "Nenad Medvidovic and Richard N. Taylor",
  title =        "A framework for classifying and comparing architecture
                 description languages",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "6",
  pages =        "60--76",
  month =        nov,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/267896.267903",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:28 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Naumovich:1997:ASA,
  author =       "Gleb Naumovich and George S. Avrunin and Lori A.
                 Clarke and Leon J. Osterweil",
  title =        "Applying static analysis to software architectures",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "6",
  pages =        "77--93",
  month =        nov,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/267896.267904",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:28 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Meijler:1997:MDP,
  author =       "Theo Dirk Meijler and Serge Demeyer and Robert Engel",
  title =        "Making design patterns explicit in {FACE}: a frame
                 work adaptive composition environment",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "6",
  pages =        "94--110",
  month =        nov,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/267896.267905",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:28 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Allen:1997:TLM,
  author =       "Graham Allen and Leighton Davies and G{\"o}ran
                 Lindmark and Even-Andr{\'e} Karlsson",
  title =        "{TTM15 --- a} large multi-site improvement project",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "6",
  pages =        "111--124",
  month =        nov,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/267896.267906",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:28 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Joeris:1997:CMN,
  author =       "Gregor Joeris",
  title =        "Change management needs integrated process and
                 configuration management",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "6",
  pages =        "125--141",
  month =        nov,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/267896.267907",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:28 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Sutton:1997:DNG,
  author =       "Stanley M. {Sutton, Jr.} and Leon J. Osterweil",
  title =        "The design of a next-generation process language",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "6",
  pages =        "142--158",
  month =        nov,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/267896.267908",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:28 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{vanderHoek:1997:SRM,
  author =       "Andr{\'e} van der Hoek and Richard S. Hall and Dennis
                 Heimbigner and Alexander L. Wolf",
  title =        "Software release management",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "6",
  pages =        "159--175",
  month =        nov,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/267896.267909",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:28 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Pohl:1997:CAP,
  author =       "Klaus Pohl and Klaus Weidenhaupt",
  title =        "A contextual approach for process-integrated tools",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "6",
  pages =        "176--192",
  month =        nov,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/267896.267910",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:28 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Jahnke:1997:GFR,
  author =       "Jens H. Jahnke and Wilhelm Sch{\"a}fer and Albert
                 Z{\"u}ndorf",
  title =        "Generic fuzzy reasoning nets as a basis for reverse
                 engineering relational database applications",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "6",
  pages =        "193--210",
  month =        nov,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/267896.267911",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:28 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Alborghetti:1997:PAS,
  author =       "Andrea Alborghetti and Angelo Gargantini and Angelo
                 Morzenti",
  title =        "Providing automated support to deductive analysis of
                 time critical systems",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "6",
  pages =        "211--226",
  month =        nov,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/267896.267912",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:28 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Cheung:1997:VLP,
  author =       "Shing Chi Cheung and Dimitra Giannakopoulou and Jeff
                 Kramer",
  title =        "Verification of liveness properties using
                 compositional reachability analysis",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "6",
  pages =        "227--243",
  month =        nov,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/267896.267913",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:28 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Dwyer:1997:MCG,
  author =       "Matthew B. Dwyer and Vicki Carr and Laura Hines",
  title =        "Model checking graphical user interfaces using
                 abstractions",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "6",
  pages =        "244--261",
  month =        nov,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/267896.267914",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:28 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Wood:1997:CCS,
  author =       "Murray Wood and Marc Roper and Andrew Brooks and James
                 Miller",
  title =        "Comparing and combining software defect detection
                 techniques: a replicated empirical study",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "6",
  pages =        "262--277",
  month =        nov,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/267896.267915",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:28 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Ebert:1997:ECP,
  author =       "Christof Ebert",
  title =        "Experiences with criticality predictions in software
                 development",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "6",
  pages =        "278--293",
  month =        nov,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/267896.267916",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:28 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Land:1997:VDD,
  author =       "Lesley Pek Wee Land and Chris Sauer and Ross Jeffery",
  title =        "Validating the defect detection performance advantage
                 of group designs for software reviews: report of a
                 laboratory experiment using program code",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "6",
  pages =        "294--309",
  month =        nov,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/267896.267917",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:28 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Desharnais:1997:ISS,
  author =       "Jules Desharnais and Marc Frappier and Ridha
                 Kh{\'e}dri and Ali Mili",
  title =        "Integration of sequential scenarios",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "6",
  pages =        "310--326",
  month =        nov,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/267896.267918",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:28 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Engels:1997:VOA,
  author =       "Gregor Engels and Reiko Heckel and Gabi Taentzer and
                 Hartmut Ehrig",
  title =        "A view-oriented approach to system modelling based on
                 graph transformation",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "6",
  pages =        "327--343",
  month =        nov,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/267896.267919",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:28 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Rosenblum:1997:DFI,
  author =       "David S. Rosenblum and Alexander L. Wolf",
  title =        "A design framework for {Internet}-scale event
                 observation and notification",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "6",
  pages =        "344--360",
  month =        nov,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/267896.267920",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:28 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Bodik:1997:RDF,
  author =       "Rastislav Bod{\'\i}k and Rajiv Gupta and Mary Lou
                 Soffa",
  title =        "Refining data flow information using infeasible
                 paths",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "6",
  pages =        "361--377",
  month =        nov,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/267896.267921",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:28 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Forgacs:1997:FTP,
  author =       "Istv{\'a}n Forg{\'a}cs and Antonia Bertolino",
  title =        "Feasible test path selection by principal slicing",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "6",
  pages =        "378--394",
  month =        nov,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/267896.267922",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:28 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Devanbu:1997:CVT,
  author =       "Prem Devanbu and Stuart G. Stubblebine",
  title =        "Cryptographic verification of test coverage claims",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "6",
  pages =        "395--413",
  month =        nov,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/267896.267923",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:28 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Chen:1997:CDM,
  author =       "Yih-Farn R. Chen and Emden R. Gansner and Eleftherios
                 Koutsofios",
  title =        "A {C++} data model supporting reachability analysis
                 and dead code detection",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "6",
  pages =        "414--431",
  month =        nov,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/267896.267924",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:28 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Reps:1997:UPP,
  author =       "Thomas Reps and Thomas Ball and Manuvir Das and James
                 Larus",
  title =        "The use of program profiling for software maintenance
                 with applications to the year 2000 problem",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "6",
  pages =        "432--449",
  month =        nov,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/267896.267925",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:28 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Heimdahl:1997:RSH,
  author =       "Mats P. E. Heimdahl and Michael W. Whalen",
  title =        "Reduction and slicing of hierarchical state machines",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "6",
  pages =        "450--467",
  month =        nov,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/267896.267926",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:28 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Schuetze:1997:PBA,
  author =       "Martin Schuetze and Jan Peter Riegel and Gerhard
                 Zimmermann",
  title =        "A pattern-based application generator for building
                 simulation",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "6",
  pages =        "468--482",
  month =        nov,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/267896.267927",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:28 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Ducasse:1997:ECT,
  author =       "St{\'e}phane Ducasse and Tamar Richner",
  title =        "Executable connectors: towards reusable design
                 elements",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "6",
  pages =        "483--499",
  month =        nov,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/267896.267928",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:28 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Picco:1997:ECM,
  author =       "Gian Pietro Picco and Gruia-Catalin Roman and Peter J.
                 McCann",
  title =        "Expressing code mobility in mobile {UNITY}",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "6",
  pages =        "500--518",
  month =        nov,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/267896.267929",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:28 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Karlsson:1997:IDA,
  author =       "Even-Andr{\'e} Karlsson and Lars Taxen",
  title =        "Incremental development for {AXE} 10",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "6",
  pages =        "519--520",
  month =        nov,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/267896.267930",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:28 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Perry:1997:TTP,
  author =       "Dewayne E. Perry and Lawrence G. Votta",
  title =        "The tale of two projects (abstract)",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "6",
  pages =        "521--522",
  month =        nov,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/267896.267931",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:28 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Idri:1997:TAC,
  author =       "A. Idri and B. Griech and A. {El Iraki}",
  title =        "Towards an adaptation of the {COCOMO} cost model to
                 the software measurement theory",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "6",
  pages =        "525--526",
  month =        nov,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/267896.267932",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:28 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Dini:1997:FSA,
  author =       "Petre Dini and Amina Belkhelladi and Walc{\'e}lio L.
                 Melo",
  title =        "Formalizing software architectures: an industrial
                 experience",
  journal =      j-SIGSOFT,
  volume =       "22",
  number =       "6",
  pages =        "527--529",
  month =        nov,
  year =         "1997",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/267896.267933",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:28 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Neumann:1998:RPCa,
  author =       "Peter G. Neumann",
  title =        "Risks to the public in computers and related systems",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "1",
  pages =        "9--15",
  month =        jan,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/272263.272266",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:32 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Doernhoefer:1998:SNSa,
  author =       "Mark Doernhoefer",
  title =        "Surfing the net for {{\booktitle{Software Engineering
                 Notes}}}",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "1",
  pages =        "16--23",
  month =        jan,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/272263.565662",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:32 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Kitchenham:1998:ESEa,
  author =       "Barbara Ann Kitchenham and Lesley M. Pickard",
  title =        "Evaluating software engineering methods and tools:
                 part 9: quantitative case study methodology",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "1",
  pages =        "24--26",
  month =        jan,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/272263.272268",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:32 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This article is the first of three articles describing
                 how to undertake a quantitative case study based on
                 work done as part of the DESMET project [1], [2]. In
                 the context of methods and tool evaluations, case
                 studies are a means of evaluating methods and tools as
                 part of the normal software development activities
                 undertaken by an organisation. The main benefit of such
                 case studies is that they allow the effect of new
                 methods and tools to be assessed in realistic
                 situations. Thus, case studies provide a cost-effective
                 means of ensuring that process changes provide the
                 desired results. However, unlike formal experiments and
                 surveys, case studies do not have a well-understood
                 theoretical basis. This series of articles provides
                 guidelines for organising and analysing case studies so
                 that your investigations of new technologies will
                 produce meaningful results.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Kwon:1998:RS,
  author =       "Oh Cheon Kwon",
  title =        "Report from {SEKE'97}",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "1",
  pages =        "27--28",
  month =        jan,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/272263.565665",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:32 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Demeyer:1998:RWO,
  author =       "Serge Demeyer and Harald Hall",
  title =        "Report: {Workshop on Object-Oriented Re-engineering
                 (WOOR'97)}",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "1",
  pages =        "28--29",
  month =        jan,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/272263.272269",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:32 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Dubois:1998:RWS,
  author =       "Eric Dubois and Andreas L. Opdahl and Klaus Pohl",
  title =        "{REFSQ'97} workshop summary",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "1",
  pages =        "30--34",
  month =        jan,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/272263.272270",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:32 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The REFSQ (Requirements Engineering: Foundation for
                 Software Quality) 1997 workshop was held in conjunction
                 with CAiSE'97 in Barcelona, Spain on June 16th and
                 17th, 1997. It was organised by Eric Dubois, Andreas L.
                 Opdahl and Klaus Pohl. In this workshop summary we, the
                 organisers, will provide an overview of the workshop
                 and of the presentations given, and present our
                 subjective view of the various and fruitful discussions
                 that took place.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Finneran:1998:RTC,
  author =       "Lisa Finneran",
  title =        "Report: technology challenges at {SPC}",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "1",
  pages =        "35--37",
  month =        jan,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/272263.272271",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:32 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Leavens:1998:WFC,
  author =       "Gary T. Leavens and Oscar Nierstrasz and Murali
                 Sitaraman",
  title =        "{1997 Workshop on Foundations of Component-Based
                 Systems}",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "1",
  pages =        "38--41",
  month =        jan,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/272263.272272",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:32 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Carreira:1998:WDS,
  author =       "Jo{\~a}o Carreira and Jo{\~a}o Gabriel Silva",
  title =        "Why do some (weird) people inject faults?",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "1",
  pages =        "42--43",
  month =        jan,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/272263.272273",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:32 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Butkus:1998:FEC,
  author =       "Al Butkus and Barbara L. Mitchell",
  title =        "A framework for encapsulating card-oriented,
                 interactive, legacy applications",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "1",
  pages =        "44--46",
  month =        jan,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/272263.272274",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:32 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Over the last several years Lockheed Martin has
                 invested IR\&D funds to explore lowering the cost of
                 ownership of Command and Control systems for DoD
                 software intensive systems. Two key technologies that
                 address this issue are developing software components
                 that can be reused across a family of systems within
                 the command and control domain and methods for reusing
                 legacy system applications. This paper describes how
                 these two approaches have been merged using Object
                 Oriented Technology to provide a reusable framework for
                 encapsulating legacy applications. The Object Oriented
                 Technology (OOT) that we consider key to lowering cost
                 of ownership and to strategies for reuse of legacy code
                 is described as Design Patterns [Gamma] and
                 Frameworks[Coplien]. Design Patterns exist at a level
                 of abstraction that provides a high return on reuse
                 investment because they model stable relationships that
                 are not likely to change as a system evolves and which
                 can be reused across systems [Coplien]. It is not the
                 intent of this paper to describe these terms. Rather it
                 is our purpose to illustrate the advantages of this
                 level of OOT.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Huang:1998:MAC,
  author =       "Riri Huang",
  title =        "Making active {CASE} tools --- toward the next
                 generation {CASE} tools",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "1",
  pages =        "47--50",
  month =        jan,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/272263.272275",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:32 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "In CASE field, there is a long-standing topic, i.e.
                 the reason that CASE tools seem to be dearly bought but
                 sparsely used. Based on our practical experience of
                 making and using CASE tools, we point out the reason is
                 that today's CASE tools are actually not very much
                 user-oriented. The factors and requirements of CASE
                 users are not given enough consideration in the
                 production of CASE tools. Most today's CASE tools are
                 motivated by new paradigms and techniques in the area
                 of software engineering. Therefore, making CASE tools
                 are often driven by techniques, rather than by real
                 users' needs and expectations. In this paper, we
                 present our viewpoints on the reason why CASE tools are
                 used below expectations. We suggest some important
                 features that are worthy of careful consideration while
                 producing more people-oriented and active CASE tools.
                 We also describe some strategies for building such CASE
                 tools.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Valenti:1998:OCO,
  author =       "S. Valenti and M. Panti and A. Cucchiarelli",
  title =        "Overcoming communication obstacles in user-analyst
                 interaction for functional requirements elicitation",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "1",
  pages =        "50--55",
  month =        jan,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/272263.272276",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:32 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The importance of requirement engineering in the
                 software development process has been widely recognised
                 by the scientific community. One of the major error
                 sources that arise in this phase is represented by
                 ineffectual communication between users and analysts.
                 Valusek and Fryback in [32] identify three classes of
                 communication obstacles to a successful elicitation of
                 requirements. Purpose of this paper is to discuss these
                 obstacles and to identify the structure of a CASE tool
                 that may allow to overcome them.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Kokol:1998:ICM,
  author =       "Peter Kokol and Janez Brest and Milan Zorman and Vili
                 Podgorelec",
  title =        "Integration of complexity metrics with the use of
                 decision trees",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "1",
  pages =        "56--58",
  month =        jan,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/272263.272277",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:32 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "We would like to present the use of the decision tree
                 approach in the integration of various complexity
                 metrics on the example of distinguishing between random
                 and ordinary programs. Following our proposition that
                 randomness indicates meaningless we can state that with
                 the approach we are able to measure the ``meaning'' of
                 computer programs. The main contributions stated in the
                 paper is that the new way of metrics integration
                 enabling one to combine metrics with various
                 measurement units.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Law:1998:GLO,
  author =       "Rob Law",
  title =        "Generalization of leaner object-oriented slicing",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "1",
  pages =        "59--61",
  month =        jan,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/272263.272278",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:32 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The Leaner Object-Oriented Slicing technique in [2],
                 albeit effective in providing further code reduction
                 from an object-oriented slice, fails to handle an
                 object-oriented slice with multiple inheritance nets.
                 That is, an object-oriented slice in a tree form with
                 multiple branches is beyond the ability of leaner
                 object-oriented slicing. This paper proposes a new
                 approach which extends the applicability of code
                 reduction by leaner object-oriented slicing. A
                 generalized leaner object-oriented slicing method can
                 now be achieved which provides further code reduction
                 for general object-oriented slices.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Xia:1998:WWS,
  author =       "Franck Xia",
  title =        "{What}'s wrong with software engineering research
                 methodology",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "1",
  pages =        "62--65",
  month =        jan,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/272263.272279",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:32 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "In a recent conference, there was a panel session on
                 whether Software Engineering is really engineering. The
                 debate was interesting but inconclusive, not because
                 the panelists disagreed on the state of the arts of
                 software engineering, but on the definition of what is
                 called engineering. Some thought that the aim of
                 engineering is to build useful machines, and as far as
                 we build machines we are engineers using engineering
                 knowledge. So the question of the panel session was
                 somehow ill-posed. For others, an engineering needs a
                 scientific theory to help building machines, and when
                 the theory cannot well guide practice, the engineering
                 is still at the craft stage [1]. I believe on the last
                 definition: an engineering must have a scientific
                 theory as foundation and this theory can be applied to
                 build products. If we examine other engineering
                 disciplines such as mechanical, electrical, or civil
                 engineering in a modern sense, all these engineering
                 disciplines have their theoretic foundation [2].
                 Therefore, anyone who builds products without theoretic
                 knowledge, whatever the expertise he may have, can only
                 be called craftsman or artist, not engineer. In this
                 sense I feel that, with the current knowledge on
                 software ``engineering'', those who develop software
                 are akin to artisans rather than engineers. Many people
                 will disagree with my assertion, by mentioning a great
                 variety of tools, languages, environments, etc. It is
                 true that software development practices have achieved
                 a lot of progress. However, as an engineering
                 discipline and therefore from its scientific aspect, I
                 think we are progressing very slowly. The reason is
                 that there are few theories in software engineering
                 that can really be qualified scientific and I will try
                 to demonstrate it from epistemology viewpoint. Comments
                 will be welcome.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Law:1998:IOO,
  author =       "Rob Law",
  title =        "Interacting with Object-Oriented Program Slicing",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "1",
  pages =        "66--67",
  month =        jan,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/272263.272280",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:32 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Object-Oriented Program Slicing was introduced by Law
                 and Maguire [1,2]. On the basis of Object-Oriented
                 Program Slicing, C++ Object-Oriented Program Slicer
                 [C++\_OOPS] was developed to assist programmers locate
                 program faults. Technical investigation of
                 Object-Oriented Program Slicing and the design of
                 C++\_OOPS can be found in [1,2]. This paper provides a
                 discussion and analysis of programmers' views towards
                 using C++\_OOPS. Users generally agree that C++\_OOPS
                 assists high-level debugging, yet a more user-friendly
                 C++\_OOPS environment could definitely be more
                 beneficial.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Martin:1998:PDU,
  author =       "Declan Martin",
  title =        "Preliminary design use cases: combining use cases and
                 event response lists for reuse and legacy system
                 enhancement",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "1",
  pages =        "68--71",
  month =        jan,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/272263.272281",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:32 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This report describes an approach to combining Use
                 Cases with elements from Event Response Lists to help
                 improve requirements understanding. The format
                 suggested for the combination, called the Preliminary
                 Design Use Cas, proves particularly effective in
                 facilitating reuse of existing system elements. It also
                 supports the definition of extensions to existing
                 systems, and encourages dialogue between customers,
                 analysts and designers. The approach has resulted from
                 industrial practice and has proven particularly
                 successful.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Anane:1998:HDP,
  author =       "R. Anane",
  title =        "Holistic design of a programming system",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "1",
  pages =        "72--76",
  month =        jan,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/272263.272282",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:32 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The different stages of the prevailing software
                 development model involve the use of software
                 development tools and methods that are usually based on
                 different paradigms. The mismatch between the different
                 levels of this hierarchical process is often a source
                 of difficulty and has led to an increasing interest in
                 the holistic approach to software design and
                 implementation. This approach requires all the levels
                 to be based on the same principles. This paper
                 describes how it was used in the design and
                 implementation of a small programming system which
                 incorporates a functional language, an optimiser and a
                 syntax-directed editor. It also highlights the
                 advantages of the holistic approach.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Mannion:1998:PR,
  author =       "Mike Mannion and Barry Keepence",
  title =        "Partnering for reuse",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "1",
  pages =        "77--80",
  month =        jan,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/272263.272283",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:32 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Software Reuse is a business solution to the
                 increasing demand for software over supply. However
                 there remains little investment in software reuse
                 despite the availability of return-on-investment models
                 to show the cost-benefits, organisational models for
                 undertaking the task and the appropriate technology to
                 do so. In addition investment in reuse which transcends
                 commercial barriers is practically non-existent. This
                 position paper argues that global Software Reuse in the
                 21st Century will not be fully exploited without
                 breaking down the traditional customer-supplier
                 relationship and adopting long-term business
                 relationships and supply chain management.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Xiaodong:1998:TDS,
  author =       "Yuan Xiaodong and Chen Jiajun and Zheng Guoliang",
  title =        "Two-dimensional software development model combining
                 object-oriented method with formal method",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "1",
  pages =        "81--85",
  month =        jan,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/272263.272284",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:32 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Most of current software development models are
                 linear, one-dimensional model. On the basis of the
                 analysis of the current models, this paper provides a
                 two-dimensional software development model that
                 combines object-oriented method with formal method.
                 This model has the advantages of both methods. We
                 introduce three key stages of the model architecture in
                 details",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Krogstie:1998:IUQ,
  author =       "John Krogstie",
  title =        "Integrating the understanding of quality in
                 requirements specification and conceptual modeling",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "1",
  pages =        "86--91",
  month =        jan,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/272263.272285",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:32 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The notion of quality of information system models and
                 other conceptual models is not well understood.
                 However, recent quality frameworks have tried to take a
                 more systematic approach. We have earlier developed a
                 framework for understanding and assessing the quality
                 of models in general, with emphasis on models made in
                 conceptual modeling languages. At the same time, there
                 is a long tradition on discussing quality of more
                 specialized models, e.g. in the form of requirements
                 specifications. Several authors have created taxonomies
                 of useful properties of models and requirements
                 specifications, the most comprehensive overview being
                 presented by Alan Davis. We have in this paper extended
                 our quality framework for models based on the work by
                 Davis on quality in requirement specifications, looking
                 upon a requirements specification as a specific type of
                 model. Comparing the approaches we find on the one hand
                 that the properties as summarized by Davis are subsumed
                 by our framework on a high level, and that there are
                 aspects within our framework that are not covered by
                 Davis. On the other hand, the comparison has resulted
                 in a useful extension and deepening of our framework on
                 this specific kind of model, and in this way improved
                 the practical applicability of our framework when
                 applied to discussing the quality of requirements
                 specifications.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Juric:1998:UR,
  author =       "Radmila Juric",
  title =        "The {UML} rules",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "1",
  pages =        "92--97",
  month =        jan,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/272263.272286",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:32 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The Unified Modelling Language (UML), version 1.0,
                 developed in order to standardise different object
                 oriented development practices, offers a general way of
                 representing technical, business and software models
                 through the structure and dynamics of the UML modelling
                 elements. The UML also defines a set of rules that are
                 expected to be followed in order to claim that the UML
                 is being followed. In this paper I extract the rules
                 related to the core concepts, and structural and
                 behavioural elements, found in the Semantics of the UML
                 documentation set.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Nourani:1998:SAI,
  author =       "Cyrus F. Nourani",
  title =        "Software agents and intelligent object fusion",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "1",
  pages =        "98",
  month =        jan,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/272263.272358",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:32 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Techniques for modular software design are presented
                 applying software agents. The conceptual designs are
                 domain independent and make use of specific domain
                 aspects applying Multiagent AI. The stages of
                 conceptualization, design and implementation are
                 defined by new techniques coordinated by objects.
                 Software systems are designed by knowledge acquisition,
                 specification, and multiagent implementations.
                 Multiagent implementations are defined for the modular
                 designs, applying our recent projects which have lead
                 to fault tolerant AI systems. A novel multi-kernel
                 design technique is presented. Communicating pairs of
                 kernels, each defining a part of the system, are
                 specified by object-coobject super-modules. Treating
                 objects as abstract data types and a two level
                 programming approach to OOP allows us to define Pull-up
                 abstractions to treat incompatible objects. Keywords
                 Abstract Objects, Intelligent syntax, MJOOP, Multi
                 Agent Object Level Programming, Multi Kernel Design
                 With OOP, Software Agents, Intelligent Objects.
                 Academic UCSB when at University",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Jianmin:1998:CMC,
  author =       "Hou Jianmin and Li Xuandong and Fan Xiaocon and Zheng
                 Guoliang",
  title =        "Compositional model-checking for real-time systems",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "1",
  pages =        "99--ff.",
  month =        jan,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/272263.272359",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:32 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Lam:1998:VCR,
  author =       "W. Lam",
  title =        "Viewpoint-centred reuse: bridging the gap between
                 reusability and the needs of the reuser",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "1",
  pages =        "100--103",
  month =        jan,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/272263.272360",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:32 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The ``Reuse without Reusers'' Syndrome. The problems
                 of low productivity, late delivery and poor software
                 quality are, unfortunately, characteristic of the
                 software industry (Horowitz and Munson 1989).
                 Increasingly, software developers are looking towards
                 reuse as a possible solution to these problems.
                 However, attempting to develop genuinely reusable
                 artifacts without a firm understanding of the reuser's
                 (or potential reuser's) needs, i.e. their ``reuse
                 requirements'', is a difficult process. A lack of
                 understanding and general detachment of the reuser from
                 the reuse process is a situation recognised in this
                 paper as the ``reuse without reusers'' syndrome. The
                 aim of this paper is to highlight the role played by
                 the reuser in the reuse process, and to encourage more
                 user-centric approaches to key reuse activities such as
                 domain analysis (Prieto-Diaz 1990). We do this by
                 describing a reuse process called Viewpoint-Centred
                 reuse (VCR), which forms part of our current research
                 agenda in the ART (Applied Reuse Technology) project at
                 the University of Hertfordshire, UK.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Lee:1998:NSM,
  author =       "Jonathan Lee and Nien-Lin Xue and Tai-Lin Kuei",
  title =        "A note on state modeling through inheritance",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "1",
  pages =        "104--110",
  month =        jan,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/272263.272361",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:32 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "How to achieve the state modeling through inheritance
                 has been considered as an important issue in
                 object-oriented modeling. In this paper, an approach
                 called Focus of Attention is proposed to make the state
                 modeling easier by constructing state representations
                 of a class from those of its parent. Facets impacting
                 the state modeling are called FOA facets, which are
                 used as a guideline to modify an inherited state model.
                 Various specialization techniques are discussed, which
                 help better understand the relationship between the
                 state model of a superclass and its subclass.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Olaughlin:1998:BRY,
  author =       "Brian Olaughlin",
  title =        "Book Reviews: {{\booktitle{The Year 2000 Software
                 Crisis: Challenge of the Century}}, William M. Ulrich
                 and Ian S. Hayes}",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "1",
  pages =        "109--109",
  month =        jan,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/272263.565644",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:32 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Tracz:1998:BRD,
  author =       "Will Tracz",
  title =        "Book Reviews: {{\booktitle{The Deadline, A Novel about
                 Project Management}}, Tom DeMarco}",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "1",
  pages =        "109--109",
  month =        jan,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/272263.565645",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:32 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Raynham:1998:BRS,
  author =       "Peter Raynham",
  title =        "Book Reviews: {{\booktitle{Smalltalk, Objects, and
                 Design}}, by Chamond Liu}",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "1",
  pages =        "110--110",
  month =        jan,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/272263.565646",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:32 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Corbett:1998:CCM,
  author =       "James C. Corbett",
  title =        "Constructing compact models of concurrent {Java}
                 programs",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "2",
  pages =        "1--10",
  month =        mar,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/271775.271778",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:34 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Finite-state verification technology (e.g., model
                 checking) provides a powerful means to detect
                 concurrency errors, which are often subtle and
                 difficult to reproduce. Nevertheless, widespread use of
                 this technology by developers is unlikely until tools
                 provide automated support for extracting the required
                 finite-state models directly from program source. In
                 this paper, we explore the extraction of compact
                 concurrency models from Java code. In particular, we
                 show how static pointer analysis, which has
                 traditionally been used for computing alias information
                 in optimizers, can be used to greatly reduce the size
                 of finite-state models of concurrent Java programs.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Harrold:1998:CIC,
  author =       "Mary Jean Harrold and Gregg Rothermel and Saurabh
                 Sinha",
  title =        "Computation of interprocedural control dependence",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "2",
  pages =        "11--20",
  month =        mar,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/271775.271780",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:34 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Program dependence information is useful for a variety
                 of software testing and maintenance tasks. Properly
                 defined, control and data dependencies can be used to
                 identify semantic dependencies. To function effectively
                 on whole programs, tools that utilize dependence
                 information require information about interprocedural
                 dependencies: dependencies that exist because of
                 interactions among procedures. Many techniques for
                 computing data and control dependencies exist; however,
                 in our search of the literature we find only one
                 attempt to define and compute interprocedural control
                 dependencies. Unfortunately, that approach can omit
                 important control dependencies, and incorrectly
                 identifies control dependencies for a large class of
                 programs. This paper presents a definition of
                 interprocedural control dependence that supports the
                 relationship of control and data dependence to semantic
                 dependence, an efficient algorithm for calculating
                 interprocedural control dependencies, and empirical
                 results obtained by our implementation of the
                 algorithm.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Stocks:1998:CFC,
  author =       "Philip A. Stocks and Barbara G. Ryder and William A.
                 Landi and Sean Zhang",
  title =        "Comparing flow and context sensitivity on the
                 modification-side-effects problem",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "2",
  pages =        "21--31",
  month =        mar,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/271775.271782",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:34 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Precision and scalability are two desirable, yet often
                 conflicting, features of data-flow analyses. This paper
                 reports on a case study of the modification ---
                 ide-effects problem for C in the presence of pointers
                 from the perspective of contrasting the flow and
                 context sensitivity of the solution procedure with
                 respect to precision and scalability. The results show
                 that the cost of precision of flow- and
                 context-sensitive analysis is not always prohibitive,
                 and that the precision of flow- and context-insensitive
                 analysis is substantially better than worst-case
                 estimates and can be sufficient for certain
                 applications. Program characteristics that affect the
                 performance of data-flow analysis are identified.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Mitchell:1998:EER,
  author =       "Brian Mitchell and Steven J. Zeil",
  title =        "An experiment in estimating reliability growth under
                 both representative and directed testing",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "2",
  pages =        "32--41",
  month =        mar,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/271775.271784",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:34 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The Order Statistic model of reliability growth offers
                 improved * experimental design, and * flexibility in
                 testing methodology compared to conventional
                 reliability growth models. It permits prediction of
                 operational reliability without requiring that testing
                 be conducted according to the operation profile of the
                 program input space. This paper presents the first
                 experimental use of the Order Statistic model under a
                 test plan that combines both representative and
                 directed tests. Results suggest that this is an
                 effective way to obtain quantified measures of test
                 quality without abandoning the advantages of directed
                 test methods.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Ntafos:1998:RPT,
  author =       "Simeon Ntafos",
  title =        "On random and partition testing",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "2",
  pages =        "42--48",
  month =        mar,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/271775.271785",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:34 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "There have been many comparisons of random and
                 partition testing. Proportional partition testing has
                 been suggested as the optimum way to perform partition
                 testing. In this paper we show that this might not be
                 so and discuss some of the problems with previous
                 studies. We look at the expected cost of failures as a
                 way to evaluate the effectiveness of testing strategies
                 and use it to compare random testing, uniform partition
                 testing and proportional partition testing. Also, we
                 introduce partition testing strategies that try to take
                 the cost of failures into account and present some
                 results on their effectiveness.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Hamlet:1998:MIP,
  author =       "Richard Hamlet and Richard Kemmerer and Edward F.
                 Miller and Debra J. Richardson",
  title =        "The most influential papers from the {ISSTA} research
                 community (panel)",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "2",
  pages =        "49",
  month =        mar,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/271775.271787",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:34 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Hamlet:1998:WCW,
  author =       "Dick Hamlet",
  title =        "What can we learn by testing a program?",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "2",
  pages =        "50--52",
  month =        mar,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/271775.271788",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:34 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "It is conventional to start research papers on
                 software engineering, particularly on testing and
                 software quality, with a statement of how important
                 software has become in the world, and the potential
                 dangers of using it when those who construct it really
                 don't know what they are doing. The author then goes on
                 to show that his or her theory/method/insights/tools
                 will make the world safe (or safer, if the author is
                 modest) by providing the understanding that is lacking.
                 ISSTA authors (I among them) have started many of their
                 papers in just this way, but speaking for myself, these
                 statements are window dressing --- they disguise my
                 real concern. Long before software was any part of the
                 workaday world, before there was any ``software
                 problem'' or even much software, I was interested in
                 program analysis because programs are arguably the most
                 intriguing mathematical objects people create. I have
                 happily pursued the study of programs for over 30
                 years.I wrote my first program (in ALGOL 58) in 1962
                 --- it failed to properly calculate a table of values
                 of the error integral, being somewhat off in the third
                 significant figure. (I remember the failure, and the
                 debugging, poring over a decimal memory dump. But I
                 can't recall the fault.) It took me until the mid-1960s
                 to recognize that programs per se were much more
                 interesting than their applications: I stumbled on
                 Maurice Halstead's book [4] on self-compiling NELIAC
                 compilers. Here was magical stuff: the master program
                 defining a language, and itself written in that
                 language! In my application to the University of
                 Washington, I explained that I wanted to study
                 computers ``for themselves, not as they are used.''
                 Paul Klee, the topologist who was saddled with the task
                 of replying to mathematics grad students that year,
                 wrote back to assure me that ``we've got a computer
                 around here somewhere, and by the time you arrive I'm
                 sure I can locate it.'' It was an IBM 7090, complete
                 with IBSYS and FORTRAN, and who could have asked for
                 software more in need of analysis? There were standards
                 of respectability for a PhD dissertation even in those
                 days, so I took up recursive function theory and the
                 program-equivalence problem. Its application to testing
                 is that we would like to know if the program under test
                 differs from its functional specification --- that is,
                 can it fail? Any understanding of programs through
                 testing (a mechanical process) must come up against the
                 program-equivalence problem: we cannot hope to gain
                 full understanding, because to do so would be to solve
                 the unsolvable problem. My dissertation was an
                 exploration of the additional information (beyond the
                 purely functional) needed to make the
                 program-equivalence problem solvable [5]. What brought
                 me to the first ISSTA in 1978 was Bill Howden's 1976
                 paper ``Reliability of the path analysis strategy''
                 [6].",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Gotlieb:1998:ATD,
  author =       "Arnaud Gotlieb and Bernard Botella and Michel Rueher",
  title =        "Automatic test data generation using constraint
                 solving techniques",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "2",
  pages =        "53--62",
  month =        mar,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/271775.271790",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:34 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Automatic test data generation leads to identify input
                 values on which a selected point in a procedure is
                 executed. This paper introduces a new method for this
                 problem based on constraint solving techniques. First,
                 we statically transform a procedure into a constraint
                 system by using well-known ``Static Single Assignment''
                 form and control-dependencies. Second, we solve this
                 system to check whether at least one feasible control
                 flow path going through the selected point exists and
                 to generate test data that correspond to one of these
                 paths. The key point of our approach is to take
                 advantage of current advances in constraint techniques
                 when solving the generated constraint system. Global
                 constraints are used in a preliminary step to detect
                 some of the non feasible paths. Partial consistency
                 techniques are employed to reduce the domains of
                 possible values of the test data. A prototype
                 implementation has been developed on a restricted
                 subset of the C language. Advantages of our approach
                 are illustrated on a non-trivial example.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Hajnal:1998:ATD,
  author =       "{\'A}kos Hajnal and Istv{\'a}n Forg{\'a}cs",
  title =        "An applicable test data generation algorithm for
                 domain errors",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "2",
  pages =        "63--72",
  month =        mar,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/271775.271791",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:34 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "An integrated testing criterion is proposed that
                 extends traditional criteria to be effective to reveal
                 domain errors. The method requires many fewer test
                 cases and is applicable for any kind of predicates. An
                 automated test data generation algorithm is developed
                 to satisfy the criterion. This is the first integrated
                 algorithm that unites path selection and test data
                 generation. The method is based on function
                 minimization and is extended to find required test
                 cases corresponding to ON-OFF points very quickly. In
                 this way the algorithm is dynamic and thus can be used
                 in practice.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Tracey:1998:APF,
  author =       "Nigel Tracey and John Clark and Keith Mander",
  title =        "Automated program flaw finding using simulated
                 annealing",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "2",
  pages =        "73--81",
  month =        mar,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/271775.271792",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:34 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "One of the major costs in a software project is the
                 construction of test-data. This paper outlines a
                 generalised test-case data generation framework based
                 on optimisation techniques. The framework can
                 incorporate a number of testing criteria, for both
                 functional and non-functional properties. Application
                 of the optimisation framework to testing specification
                 failures and exception conditions is illustrated. The
                 results of a number of small case studies are presented
                 and show the efficiency and effectiveness of this
                 dynamic optimisation-base approach to generating
                 test-data.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Ostrand:1998:VTD,
  author =       "Thomas Ostrand and Aaron Anodide and Herbert Foster
                 and Tarak Goradia",
  title =        "A visual test development environment for {GUI}
                 systems",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "2",
  pages =        "82--92",
  month =        mar,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/271775.271793",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:34 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "We have implemented an experimental test development
                 environment (TDE) intended to raise the effectiveness
                 of tests produced for GUI systems, and raise the
                 productivity of the GUI system tester. The environment
                 links a test designer, a test design library, and a
                 test generation engine with a standard commercial
                 capture/replay tool. These components provide a human
                 tester the capabilities to capture sequences of
                 interactions with the system under test (SUT), to
                 visually manipulate and modify the sequences, and to
                 create test designs that represent multiple individual
                 test sequences. Test development is done using a
                 high-level model of the SUT's GUI, and graphical
                 representations of test designs. TDE performs certain
                 test maintenance tasks automatically, permitting
                 previously written test scripts to run on a revised
                 version of the SUT.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Molloy:1998:AIT,
  author =       "Mark Molloy and Kristy Andrews and James Herren and
                 David Cutler and Paul {Del Vigna}",
  title =        "Automatic interoperability test generation for
                 source-to-source translators",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "2",
  pages =        "93--101",
  month =        mar,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/271775.271796",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:34 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This paper describes a strategy for automatically
                 generating tests which ensure interface compatibility
                 between software components expressed in two different
                 languages. This strategy is useful for testing code
                 produced by a source-to-source computer language
                 translator and for testing the compatibility of
                 compilers for the different languages.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Chan:1998:IES,
  author =       "William Chan and Richard J. Anderson and Paul Beame
                 and David Notkin",
  title =        "Improving efficiency of symbolic model checking for
                 state-based system requirements",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "2",
  pages =        "102--112",
  month =        mar,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/271775.271798",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:34 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "We present various techniques for improving the time
                 and space efficiency of symbolic model checking for
                 system requirements specified as synchronous finite
                 state machines. We used these techniques in our
                 analysis of the system requirements specification of
                 TCAS II, a complex aircraft collision avoidance system.
                 They together reduce the time and space complexities by
                 orders of magnitude, making feasible some analysis that
                 was previously intractable. The TCAS II requirements
                 were written in RSML, a dialect of state-charts.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Bultan:1998:VSI,
  author =       "Tevfik Bultan and Richard Gerber and Christopher
                 League",
  title =        "Verifying systems with integer constraints and
                 {Boolean} predicates: a composite approach",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "2",
  pages =        "113--123",
  month =        mar,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/271775.271799",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:34 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Symbolic mode, checking has proved highly successful
                 for large finite-state systems, in which states can be
                 compactly encoded using binary decision diagrams (BDDs)
                 or their variants. The inherent limitation of this
                 approach is that it cannot be applied to systems with
                 an infinite number of states --- even those with a
                 single unbounded integer. Alternatively, we recently
                 proposed a model checker for integer-based systems that
                 uses Presburger constraints as the underlying state
                 representation. While this approach easily verified
                 some subtle, infinite-state concurrency problems, it
                 proved inefficient in its treatment of Boolean and
                 (unordered) enumerated types --- which possess no
                 natural mapping to the Euclidean coordinate space. In
                 this paper we describe a model checker which combines
                 the strengths of both approaches. We use a composite
                 model, in which a formula's valuations are encoded in a
                 mixed BDD-Presburger form, depending on the variables
                 used. We demonstrate our technique's effectiveness on a
                 nontrivial requirements specification, which includes a
                 mixture of Booleans, integers and enumerated types.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Godefroid:1998:MCM,
  author =       "Patrice Godefroid and Robert S. Hanmer and Lalita
                 Jategaonkar Jagadeesan",
  title =        "Model checking without a model: an analysis of the
                 heart-beat monitor of a telephone switch using
                 {VeriSoft}",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "2",
  pages =        "124--133",
  month =        mar,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/271775.271800",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:34 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "VeriSoft is a tool for systematically exploring the
                 state spaces of systems composed of several concurrent
                 processes executing arbitrary code written in
                 full-fledged programming languages such as C or C++.
                 The state space of a concurrent system is a directed
                 graph that represents the combined behavior of all
                 concurrent components in the system. By exploring its
                 state space, VeriSoft can automatically detect
                 coordination problems between the processes of a
                 concurrent system. We report in this paper our analysis
                 with VeriSoft of the ``Heart-Beat Monitor'' (HBM), a
                 telephone switching application developed at Lucent
                 Technologies. The HBM of a telephone switch determines
                 the status of different elements connected to the
                 switch by measuring propagation delays of messages
                 transmitted via these elements. This information plays
                 an important role in the routing of data in the switch,
                 and can significantly impact switch performance. We
                 discuss the steps of our analysis of the HBM using
                 VeriSoft. Because no modeling of the HBM code is
                 necessary with this tool, the total elapsed time before
                 being able to run the first tests was on the order of a
                 few hours, instead of several days or weeks that would
                 have been needed for the (error-prone) modeling phase
                 required with traditional model checkers or theorem
                 provers. We then present the results of our analysis.
                 Since VeriSoft automatically generates, executes and
                 evaluates thousands of tests per minute and has
                 complete control over nondeterminism, our analysis
                 revealed HBM behavior that is virtually impossible to
                 detect or test in a traditional lab-testing
                 environment. Specifically, we discovered flaws in the
                 existing documentation on this application and
                 unexpected behaviors in the software itself. These
                 results are being used as the basis for the redesign of
                 the HBM software in the next commercial release of the
                 switching software.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Ball:1998:LCF,
  author =       "Thomas Ball",
  title =        "On the limit of control flow analysis for regression
                 test selection",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "2",
  pages =        "134--142",
  month =        mar,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/271775.271802",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:34 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Automated analyses for regression test selection (RTS)
                 attempt to determine if a modified program, when run on
                 a test t, will have the same behavior as an old version
                 of the program run on t, but without running the new
                 program on t. RTS analyses must confront a
                 price/performance tradeoff: a more precise analysis
                 might be able to eliminate more tests, but could take
                 much longer to run. We focus on the application of
                 control flow analysis and control flow coverage,
                 relatively inexpensive analyses, to the RTS problem,
                 considering how the precision of RTS algorithms can be
                 affected by the type of coverage information collected.
                 We define a strong optimality condition
                 (edge-optimality) for RTS algorithms based on edge
                 coverage that precisely captures when such an algorithm
                 will report that re-testing is needed, when, in
                 actuality, it is not. We reformulate Rothermel and
                 Harrold's RTS algorithm and present three new
                 algorithms that improve on it, culminating in an
                 edge-optimal algorithm. Finally, we consider how path
                 coverage can be used to improve the precision of RTS
                 algorithms.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Korel:1998:ART,
  author =       "Bogdan Korel and Ali M. Al-Yami",
  title =        "Automated regression test generation",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "2",
  pages =        "143--152",
  month =        mar,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/271775.271803",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:34 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Regression testing involves testing the modified
                 program in order to establish the confidence in the
                 modifications. Existing regression testing methods
                 generate test cases to satisfy selected testing
                 criteria in the hope that this process may reveal
                 faults in the modified program. In this paper we
                 present a novel approach of automated regression test
                 generation in which all generated test cases uncover an
                 error(s). This approach is used to test the common
                 functionality of the original program and its modified
                 version, i.e., it is used for programs whose
                 functionality is unchanged after modifications. The
                 goal in this approach is to identify test cases for
                 which the original program and the modified program
                 produce different outputs. If such a test is found,
                 then this test uncovers an error. The problem of
                 finding such a test case may be reduced to the problem
                 of finding program input on which a selected statement
                 is executed. As a result, existing methods of automated
                 test data generation for white-box testing may be used
                 to generate these tests. Our experiments have shown
                 that our approach may improve the chances of finding
                 software errors as compared to the existing methods of
                 regression testing. The advantage of our approach is
                 that it is fully automated and that all generated test
                 cases reveal an error(s).",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Yang:1998:ADP,
  author =       "Cheer-Sun D. Yang and Amie L. Souter and Lori L.
                 Pollock",
  title =        "All-du-path coverage for parallel programs",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "2",
  pages =        "153--162",
  month =        mar,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/271775.271804",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:34 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "One significant challenge in bringing the power of
                 parallel machines to application programmers is
                 providing them with a suite of software tools similar
                 to the tools that sequential programmers currently
                 utilize. In particular, automatic or semi-automatic
                 testing tools for parallel programs are lacking. This
                 paper describes our work in automatic generation of
                 all-du-paths for testing parallel programs. Our goal is
                 to demonstrate that, with some extension, sequential
                 test data adequacy criteria are still applicable to
                 parallel program testing. The concepts and algorithms
                 in this paper have been incorporated as the foundation
                 of our DELaware PArallel Software Testing Aid, della
                 pasta.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Bagert:1998:TPL,
  author =       "Donald J. Bagert",
  title =        "{Texas} poised to license professional engineers in
                 software engineering",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "3",
  pages =        "8--10",
  month =        may,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/279437.279440",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:36 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Engel:1998:DAC,
  author =       "Gerald L. Engel and Richard J. LeBlanc and Bruce Ho
                 Barnes and Martin Lo Griss and Tony Wasserman and
                 Laurie Werth",
  title =        "Draft accreditation criteria for software
                 engineering",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "3",
  pages =        "11--12",
  month =        may,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/279437.279441",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:36 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Doernhoefer:1998:SNSb,
  author =       "Mark Doernhoefer",
  title =        "Surfing the net for {{\booktitle{Software Engineering
                 Notes}}}",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "3",
  pages =        "13--19",
  month =        may,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/279437.279443",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:36 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Kitchenham:1998:ESEb,
  author =       "Barbara Ann Kitchenham and Lesley M. Pickard",
  title =        "Evaluating software eng. methods and tools part 10:
                 designing and running a quantitative case study",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "3",
  pages =        "20--22",
  month =        may,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/279437.279445",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:36 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "In the last article we considered how to identify the
                 context for a case study and how to define and validate
                 a case study hypothesis. In this article, we continue
                 my discussion of the eight steps involved in a
                 quantitative case study by considering the remaining
                 six steps: selecting the host projects; identifying the
                 method of comparison; minimising the effect of
                 confounding factors, planning the case study,
                 monitoring the case study, analysing the results.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Neumann:1998:RPCb,
  author =       "Peter G. Neumann",
  title =        "Risks to the public in computers and related systems",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "3",
  pages =        "23--29",
  month =        may,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/279437.279447",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:36 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Tracz:1998:HDP,
  author =       "Will Tracz",
  title =        "Highlights from the {DoD} product line practice
                 workshop product lines: bridging the gap --- commercial
                 success to {DoD} practice",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "3",
  pages =        "29--31",
  month =        may,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/279437.279448",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:36 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Addy:1998:RFA,
  author =       "Edward A. Addy",
  title =        "Report from the {First Annual Workshop on Software
                 Architectures in Product Line Acquisitions}",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "3",
  pages =        "32--39",
  month =        may,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/279437.279454",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:36 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Clements:1998:NSI,
  author =       "Paul C. Clements and Nelson Weiderman",
  title =        "Notes on the {Second International Workshop on
                 Development and Evolution of Software Architectures for
                 Product Families}",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "3",
  pages =        "39--43",
  month =        may,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/279437.279458",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:36 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Thompson:1998:WCS,
  author =       "Craig Thompson",
  title =        "{Workshop on Compositional Software Architectures}:
                 workshop report",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "3",
  pages =        "44--63",
  month =        may,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/279437.279460",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:36 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Parnas:1998:SSE,
  author =       "David Lorge Parnas",
  title =        "Successful software engineering research",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "3",
  pages =        "64--68",
  month =        may,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/279437.279464",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:36 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Rumination about what makes research successful is a
                 strong indication that a researcher will not continue
                 to do successful research. Nonetheless, the invitation
                 to publish a short article in SEN on the occasion of
                 being honoured by receiving SIGSOFT's ``Outstanding
                 Research Award'' has led me to reflect on what I have
                 done. I have been active in research on software design
                 for more than 35 years; perhaps this is the time to
                 pause and look back. I also want to look forward; I
                 have some concerns about the direction being taken by
                 many researchers in the software community and would
                 like to offer them my (possibly unwelcome) advice.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Barnes:1998:HSE,
  author =       "Bruce H. Barnes",
  title =        "A history of software engineering at the {National
                 Science Foundation} (a personal view)",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "3",
  pages =        "68--69",
  month =        may,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/279437.279465",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:36 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Marovac:1998:EDS,
  author =       "Nenad Marovac",
  title =        "Embedded documentation for semi-automatic program
                 construction and software reuse",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "3",
  pages =        "70--74",
  month =        may,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/279437.279468",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:36 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The purpose of this paper is to present a mechanism to
                 classify software components for software reuse and
                 semi-automatic program construction. The paper goes on
                 to describe how is the classification information
                 incorporated into software components through Flagged
                 Sentences in Embedded Software Documentation.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Haneef:1998:SDR,
  author =       "Nuzhat J. Haneef",
  title =        "Software documentation and readability: a proposed
                 process improvement",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "3",
  pages =        "75--77",
  month =        may,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/279437.279470",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:36 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The paper is based on the premise that the
                 productivity and quality of software development and
                 maintenance, particularly in large and long term
                 projects, is related to software readability. Software
                 readability depends on such things as coding
                 conventions and system overview documentation. Existing
                 mechanisms to ensure readability --- for example, peer
                 reviews --- are not sufficient. The paper proposes that
                 software organizations or projects institute a
                 readability/documentation group, similar to a test or
                 usability group. This group would be composed of
                 programmers and would produce overview documentation
                 and ensure code and documentation readability. The
                 features and functions of this group are described. Its
                 benefits and possible objections to it are discussed.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Yuan:1998:DCC,
  author =       "Xiaodong Yuan and Jiajun Chen and Guoliang Zheng",
  title =        "Duration calculus in {COOZ}",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "3",
  pages =        "78",
  month =        may,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/279437.279473",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:36 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Fan:1998:RAT,
  author =       "Xiaocong Fan and Dianxiang Xu and Jianmin Hou and
                 Guoliang Zheng",
  title =        "Reasoning about team tracking",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "3",
  pages =        "79--82",
  month =        may,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/279437.279476",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:36 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "One subject of much ongoing research is team tracking
                 --- tracking a team's joint goals and intentions in
                 dynamic, real-time domains. In this paper, a theory of
                 team tracking and an architecture for team-oriented
                 communication-based agents are presented. The problems
                 faced in tracking ill-structured teams are also
                 discussed.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Chen:1998:MTO,
  author =       "Jiajun Chen and Xiaodong Yuan and Guolian Zhengp",
  title =        "A multi-threaded object-oriented programming model",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "3",
  pages =        "83--86",
  month =        may,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/279437.279477",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:36 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/multithreading.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This paper presents a concurrent object-oriented
                 programming (COOP) model established around concurrent
                 objects which may have a body. Once an object with a
                 body is created, its body begins to run as a separate
                 execution thread of the object. Distinguished from some
                 active-object-based concurrent object-oriented models,
                 the object body in our model is not used for the
                 concurrency control of objects, but only as a mechanism
                 to introduce concurrent executions into OO model.
                 Concurrency control is specified by the attributes of
                 objects and the control codes are generated by a
                 compiling system based on these attributes. In
                 addition, objects should be designed in such a way that
                 they can be used in both sequential and concurrent
                 environments, no matter whether they have a body or
                 not. In our model, several execution threads may
                 coexist in an object and some synchronization
                 mechanisms are provided to control the concurrent
                 executions of these threads. The paper presents two
                 examples of concurrent programming with our model.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Liu:1998:AOM,
  author =       "Hong Liu and G. Zeng and Zongkai Lin",
  title =        "An agent-oriented modeling approach",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "3",
  pages =        "87--92",
  month =        may,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/279437.279480",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:36 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This paper proposes an agent-oriented modeling method
                 for the information processing. First of all, it
                 presents an information processing model for real
                 world; then the hierarchical organization of agents and
                 the structure of an agent are given. Furthermore, the
                 logical representation of transaction and event are
                 described. Finally, an agent-oriented modeling process
                 is put forward. Modeling starts from describing the
                 agents that participate in the process; then gathers
                 the other information centered on agents and creates
                 the model. The approach can explicitly present the
                 organized structure of agents and the correlation among
                 transactions, reflect the dynamic process change by
                 describing the state change of the system, illustrate
                 the dynamic character of information process.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Kolski:1998:CAA,
  author =       "Christophe Kolski",
  title =        "A ``call for answers'' around the proposition of an
                 {HCI}-enriched model",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "3",
  pages =        "93--96",
  month =        may,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/279437.279483",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:36 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The engineering of Human-Computer Interface (HCI) is a
                 wide-ranging and huge research field. However
                 development models stemming from Software Engineering
                 overlook important aspects in terms of interactive
                 systems development. That is why an HCI-enriched model,
                 called $ \nabla $ model (pronounced nabla model), is
                 envisaged in this paper.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Soloman:1998:NBD,
  author =       "Ad Soloman",
  title =        "A new bachelor's degree program in software
                 engineering",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "3",
  pages =        "98--101",
  month =        may,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/279437.279485",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:36 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "We describe a new program of studies in Software
                 Engineering (SE). The program regards SE as an
                 engineering discipline and focuses on the training of
                 the student as an engineer involved in all aspects of a
                 software product.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Strens:1998:URM,
  author =       "M. R. Strens and J. S. Chudge",
  title =        "Using responsibility modeling to match organizational
                 change to changes in the systems development process",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "3",
  pages =        "102--104",
  month =        may,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/279437.279486",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:36 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Changes to an established software system development
                 process are made for many reasons. We describe the use
                 of responsibility modeling as an aid to identifying the
                 organizational changes needed if changes to the
                 software systems development process are to be
                 implemented successfully within the organizational
                 context.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Raccoon:1998:TTS,
  author =       "L. B. S. Raccoon",
  title =        "Toward a tradition of software engineering",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "3",
  pages =        "105--110",
  month =        may,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/279437.279487",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:36 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Ever since Boehm's Letter from the Executive
                 Committee, in October 1994, the question, ``is software
                 engineering really engineering?'' has been raised many
                 times. Apparently, the National Society of Professional
                 Engineers would like to make it illegal for anyone to
                 call himself or herself a ``software engineer'' because
                 software engineering is not one of their 36 recognized
                 disciplines. In response, we have been asking questions
                 like: ``Is software development the same as software
                 engineering?'' ``If not, what is the difference?'' and
                 ``What would it take for us to become software
                 engineers?''In January 1997, I received a copy of
                 Defining ``Engineer'' --- How to Do It, and Why It
                 Matters by Davis. After reading it closely, I feel
                 compelled to write the following notes about the role
                 of tradition in engineering and about the prospect of
                 software engineering becoming real engineering.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Raccoon:1998:MCH,
  author =       "L. S. B. Raccoon and Puppydog P. O. P.",
  title =        "A middle-out concept of hierarchy (or the problem of
                 feeding the animals)",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "3",
  pages =        "111--119",
  month =        may,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/279437.279489",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:36 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Developers use class hierarchies to model ``real
                 world'' objects and as metaphors to organize their
                 programs. We (the authors) believe that developers
                 intuitively understand the variety of everyday objects:
                 this cup, that water, those pencils, or in computer
                 terms, this number, that window, those records. We also
                 believe that developers approve of only one concept of
                 class hierarchy, one out of many possible concepts.
                 Many hidden assumptions lurk behind object-oriented
                 inheritance. Traditional object-oriented concepts of
                 hierarchy are obsessively top-down and ignore many
                 obvious bottom-up relationships. Authors who write
                 about object-oriented programming usually define class
                 hierarchies in traditional or archaic terms, referring
                 to the theory of Realism and ancient Greek philosophy.
                 But, just because somebody sees a similarity between
                 concepts in Smalltalk or C++ and concepts described by
                 Plato and other philosophers, does not mean that the
                 perception is appropriate. While the correspondences
                 between classes and concepts from philosophy are
                 interesting, they are not the only possible or useful
                 correspondences. In Women, Fire, and Dangerous Things
                 on page 6, Lakoff writes, ``In fact, until very
                 recently, the classical theory of categories was not
                 even thought of as a theory. It was taught in most
                 disciplines not as an empirical hypothesis but as an
                 unquestionable, definitional truth.''We want to change
                 that assumption and expand the possibilities of what
                 class hierarchies can be. Specifically, we introduce a
                 cognitive science perspective of objects and the basic
                 level of a class hierarchy. We believe that developers
                 use software classes in a middle-out manner, just like
                 people use linguistic categories. We believe that this
                 middle-out interpretation explains some of the limits
                 to modeling with traditional object-oriented
                 inheritance. We use the basic level to distinguish
                 between the type relationships within a class
                 hierarchy: above the basic level, developers use
                 runtime type relationships, and below the basic, level
                 developers use compile-time type relationships. We also
                 show that developers do program above the basic level.
                 This paper is organized as follows. In the first
                 section, we discuss class and hierarchy from a
                 cognitive science point of view. In the second section,
                 we define the basic level and describe a middle-out
                 concept of hierarchy. In the third section, we explain
                 the developer's version of basic level through the
                 example of ``feeding the animals'' and show how it
                 relates to type checking. We also describe some of the
                 techniques that developers use to program above the
                 basic level. And, in the fourth section, we argue that
                 many traditional concepts of inheritance fail above the
                 basic level. We argue that the subset and prototype
                 concepts of hierarchy do not work in general, and we
                 argue that Liskov's Substitution Principle and Meyer's
                 Open-Closed Principle only work below the basic
                 level.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Krasna:1998:HIQ,
  author =       "Marjan Kra{\v{s}}na and Ivan Rozman and Bruno
                 Stiglic",
  title =        "How to improve the quality of software engineering
                 project management",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "3",
  pages =        "120--125",
  month =        may,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/279437.279490",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:36 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Every project, including software engineering
                 projects, start with the project plan. A project plan
                 means the prediction of future events with the goal of
                 minimizing the risk during execution of the project.
                 The heart of the problem is to make the project plan as
                 close to reality as possible. Ideally, it should be
                 exactly the same as the post project measured data. In
                 the end we always encounter the problem of ``the
                 perfect project plan''. Does a perfect project plan
                 exist? If it does not exist, can we be any better than
                 we are now? In the article we will show that we can
                 improve, but the perfect project plan is still
                 somewhere in the future.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Doernhoefer:1998:BRO,
  author =       "Mark Doernhoefer",
  title =        "Book Reviews: {{\booktitle{Object Models Strategies,
                 Patterns, and Applications}}, by Peter Coad}",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "3",
  pages =        "125--125",
  month =        may,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/279437.565648",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:36 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Leisner:1998:BRS,
  author =       "Marty Leisner",
  title =        "Book Reviews: {{\booktitle{Structuring Techniques: an
                 Introduction Using C++}}, Andrew C. Staugaard, Jr.}",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "3",
  pages =        "126--126",
  month =        may,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/279437.565683",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:36 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Poulin:1998:BRH,
  author =       "Jeffrey S. Poulin",
  title =        "Book Reviews: {{\booktitle{High Performance Oracle8
                 Object-Oriented Design}}, David A. Anstey}",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "3",
  pages =        "127--128",
  month =        may,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/279437.565684",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:36 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Raynham:1998:BRO,
  author =       "Peter Raynham",
  title =        "Book Reviews: {{\booktitle{Object Oriented COBOL}},
                 Edmund C. Arranga and Frank P. Coyle}",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "3",
  pages =        "128--129",
  month =        may,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/279437.565685",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:36 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Kostecki:1998:BRC,
  author =       "John A. Kostecki",
  title =        "Book Reviews: {{\booktitle{The Craft of Software
                 Testing: Subsystem Testing Including Object-Based and
                 Object-Oriented Testing}}, by Brian Maxick}",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "3",
  pages =        "129--130",
  month =        may,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/279437.565688",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:36 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Mester:1998:AFP,
  author =       "Arnulf Mester",
  title =        "{ACM Fellow} profile: {James Jay (Jim) Horning}",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "4",
  pages =        "7--8",
  month =        jul,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/286366.286367",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:37 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Cooper:1998:AFPa,
  author =       "Greg Cooper",
  title =        "{ACM Fellow} profile: {Dennis J. Frailey}",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "4",
  pages =        "9--11",
  month =        jul,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/286366.286368",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:37 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Kitchenham:1998:ESEc,
  author =       "Barbara Ann Kitchenham and Lesley M. Pickard",
  title =        "Evaluating software engineering methods and tools,
                 part 11: analysing quantitative case studies",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "4",
  pages =        "18--20",
  month =        jul,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/286366.286370",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:37 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Neumann:1998:RPCc,
  author =       "Peter G. Neumann",
  title =        "Risks to the public in computers and related systems",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "4",
  pages =        "21--25",
  month =        jul,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/286366.286371",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:37 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Parnas:1998:WTM,
  author =       "David Lorge Parnas",
  title =        "Who taught me about software engineering research?",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "4",
  pages =        "26--28",
  month =        jul,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/286366.286372",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:37 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Li:1998:OSA,
  author =       "Li Li and Dharma P. Agrawal",
  title =        "Operating systems architecture future directions for
                 heterogeneous communication systems",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "4",
  pages =        "35--37",
  month =        jul,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/286366.286373",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:37 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Samaraweera:1998:EFO,
  author =       "L. G. Samaraweera and R. Harrison",
  title =        "Evaluation of the functional and object-oriented
                 programming paradigms: a replicated experiment",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "4",
  pages =        "38--43",
  month =        jul,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/286366.286374",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:37 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Kang:1998:PFB,
  author =       "Kyo C. Kang and Gerard J. Kim and Ji Y. Lee and Hye J.
                 Kim",
  title =        "Prototype = function + behavior + form",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "4",
  pages =        "44--49",
  month =        jul,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/286366.286375",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:37 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Laws:1998:MCS,
  author =       "John Laws",
  title =        "Management of complexity in software development",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "4",
  pages =        "50--52",
  month =        jul,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/286366.286376",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:37 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Vesterinen:1998:UID,
  author =       "Petri Vesterinen",
  title =        "Using inconsistent data for software process
                 improvement",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "4",
  pages =        "53--55",
  month =        jul,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/286366.286377",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:37 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{pratimPal:1998:FAL,
  author =       "Partha pratim Pal",
  title =        "A flexible, applet-like software distribution
                 mechanism for {Java} applications",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "4",
  pages =        "56--60",
  month =        jul,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/286366.286378",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:37 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Wang:1998:BTR,
  author =       "Yingxu Wang and Graham King and Dilip Patel and Ian
                 Court and Geoff Staples and Margaret Ross and Shushma
                 Patel",
  title =        "On built-in tests and reuse in object-oriented
                 programming",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "4",
  pages =        "60--64",
  month =        jul,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/286366.286379",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:37 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Ellmer:1998:LPS,
  author =       "Ernst Ellmer",
  title =        "A learning perspective on software process
                 technology",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "4",
  pages =        "65--69",
  month =        jul,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/286366.286380",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:37 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Wang:1998:LBE,
  author =       "Chung-Hua Wang and Feng-Jian Wang",
  title =        "A language-based editing process for visual
                 object-oriented programming",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "4",
  pages =        "70--75",
  month =        jul,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/286366.286381",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:37 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Xiaodong:1998:CCO,
  author =       "Yuan Xiaodong and Hu Deqiang and Xu Hao and Li Yong
                 and Zheng Guoliang",
  title =        "{COOZ}: a complete object-oriented extension to Z",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "4",
  pages =        "76--81",
  month =        jul,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/286366.286382",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:37 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Singh:1998:MWNa,
  author =       "Yogesh Singh and Pradeep Bhatia",
  title =        "Module weakness: a new measure",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "4",
  pages =        "82",
  month =        jul,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/286366.286383",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:37 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Xiaocong:1998:RCA,
  author =       "Fan Xiaocong and Chen Guanling and Zheng Guoliang",
  title =        "Research on concurrent actions in multi-agent
                 systems",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "4",
  pages =        "83",
  month =        jul,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/286366.286384",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:37 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Bagert:1998:TBV,
  author =       "Donald J. Bagert",
  title =        "{Texas} board votes to license software engineers",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "5",
  pages =        "7",
  day =          "1",
  month =        sep,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/290249.290251",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:38 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Cooper:1998:AFPb,
  author =       "Greg Cooper",
  title =        "{ACM Fellow} profile: {Grady Booch}",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "5",
  pages =        "8--10",
  day =          "1",
  month =        sep,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/290249.290253",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:38 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Cooper:1998:AFPc,
  author =       "Greg Cooper and Arnulf Mester",
  title =        "{ACM Fellow} profile: {Meir M (Manny) Lehman}",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "5",
  pages =        "11",
  day =          "1",
  month =        sep,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/290249.290254",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:38 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Kitchenham:1998:ESEd,
  author =       "Barbara Ann Kitchenham",
  title =        "Evaluating software engineering methods and tools part
                 12: evaluating {DESMET}",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "5",
  pages =        "21--24",
  day =          "1",
  month =        sep,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/290249.290255",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:38 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Neumann:1998:RPCd,
  author =       "Peter G. Neumann",
  title =        "Risks to the public in computers and related systems",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "5",
  pages =        "25--29",
  day =          "1",
  month =        sep,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/290249.290256",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:38 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Poulin:1998:ICS,
  author =       "Jeffrey S. Poulin and Prem Devanbu",
  title =        "5th international conference on software reuse
                 {(ICSR'5)} conference summary",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "5",
  pages =        "30--35",
  day =          "1",
  month =        sep,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/290249.290258",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:38 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Muller:1998:PCS,
  author =       "Hausi M{\"u}ller and Thomas Reps and Gregor Snelting",
  title =        "Program comprehension and software reengineering",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "5",
  pages =        "36--44",
  day =          "1",
  month =        sep,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/290249.290260",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:38 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Opdahl:1998:WSR,
  author =       "Andreas L. Opdahl and Klaus Pohl",
  title =        "Workshop summary: {REFSQ'98}",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "5",
  pages =        "44--50",
  day =          "1",
  month =        sep,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/290249.290262",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:38 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Kim:1998:TRO,
  author =       "Hyoseob Kim",
  title =        "Trip report to the one-day seminar on componentware
                 development",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "5",
  pages =        "50--51",
  day =          "1",
  month =        sep,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/290249.290263",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:38 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Ram:1998:IMD,
  author =       "D. Janaki Ram and R. A. Dwivedi and Ramakrishna
                 Ongole",
  title =        "An implementation mechanism for design patterns",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "5",
  pages =        "52--56",
  day =          "1",
  month =        sep,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/290249.290264",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:38 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Zheng:1998:IFS,
  author =       "Mingchun Zheng and Jiazhong Zhang and Yanbing Wang",
  title =        "Integrating a formal specification notation with
                 {HOOD}",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "5",
  pages =        "57--61",
  day =          "1",
  month =        sep,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/290249.290265",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:38 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Hilera:1998:SDE,
  author =       "Jos{\'e} R. Hilera and Le{\'o}n A. Gonz{\'a}lez and
                 Jos{\'e} A. Guiti{\'e}rrez and J. M. Martinez",
  title =        "Software documentation as an engineering process",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "5",
  pages =        "61--64",
  day =          "1",
  month =        sep,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/290249.290266",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:38 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Rajanna:1998:TDG,
  author =       "V. Rajanna",
  title =        "Test data generation",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "5",
  pages =        "65--68",
  day =          "1",
  month =        sep,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/290249.290267",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:38 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Favaro:1998:MSD,
  author =       "John Favaro and Shari Lawrence Pfleeger",
  title =        "Making software development investment decisions",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "5",
  pages =        "69--74",
  day =          "1",
  month =        sep,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/290249.290268",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:38 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Wong:1998:UDS,
  author =       "W. Eric Wong and Norman Wilde and Kristin Blackwell
                 and Rendy Justice",
  title =        "Understanding data-sensitive code: one piece of the
                 year 2000 puzzle",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "5",
  pages =        "75--80",
  day =          "1",
  month =        sep,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/290249.290269",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:38 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Singh:1998:MWNb,
  author =       "Yogesh Singh and Pradeep Bhatia",
  title =        "Module weakness: a new measure",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "5",
  pages =        "81",
  day =          "1",
  month =        sep,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/290249.290270",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:38 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Huang:1998:FHO,
  author =       "Riri Huang",
  title =        "Formalizing hierarchical object-oriented design
                 method",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "5",
  pages =        "82--88",
  day =          "1",
  month =        sep,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/290249.290271",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:38 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Astley:1998:CCD,
  author =       "Mark Astley and Gul A. Agha",
  title =        "Customization and composition of distributed objects:
                 middleware abstractions for policy management",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "6",
  pages =        "1--9",
  month =        nov,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/291252.288206",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:40 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Current middleware solutions such as CORBA and Java's
                 RMI emphasize compositional design by separating
                 functional aspects of a system (e.g. objects) from the
                 mechanisms used for interaction (e.g. remote procedure
                 call through stubs and skeletons). While this is an
                 effective solution for handling distributed
                 interactions, higher-level requirements such as
                 heterogeneity, availability, and adaptability require
                 policies for resource management as well as
                 interaction. We describe the Distributed Connection
                 Language (dcl): an architecture description language
                 based on the Actor model of distributed objects. System
                 components and the policies which govern an
                 architecture are specified as encapsulated groups of
                 actors. Composition operators are used to build
                 connections between components as well as customize
                 their behavior. This customization is realized using a
                 meta-architecture. We describe the syntax and semantics
                 of dcl, and illustrate the language by way of several
                 examples.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Seemann:1998:PBD,
  author =       "Jochen Seemann and J{\"u}rgen Wolff von Gudenberg",
  title =        "Pattern-based design recovery of {Java} software",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "6",
  pages =        "10--16",
  month =        nov,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/291252.288207",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:40 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "In this paper we show how to recover design
                 information from Java source code. We take a
                 pattern-based approach and proceed in a step by step
                 manner deriving several layers of increasing
                 abstraction. A compiler collects information about
                 inheritance hierarchies and method call relations. It
                 also looks for particular source text patterns coming
                 from naming conventions or programming guidelines. The
                 result of the compile phase is a graph acting as the
                 starting graph of a graph grammar that describes our
                 design recovery process. We define criteria for the
                 automatic detection of associations and aggregations
                 between classes, as well as for some of the popular
                 design patterns such as composite or strategy.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Stevens:1998:SRP,
  author =       "Perdita Stevens and Rob Pooley",
  title =        "Systems reengineering patterns",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "6",
  pages =        "17--23",
  month =        nov,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/291252.288210",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:40 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The reengineering of legacy systems --- by which we
                 mean those that have value and yet ``significantly
                 resist modification and evolution to meet new and
                 constantly changing business requirements'' --- is
                 widely recognised as one of the most significant
                 challenges facing software engineers. The problem is
                 widespread, affecting all kinds of organisations;
                 serious, as failure to reengineer can hamper an
                 organisation's attempts to remain competitive; and
                 persistent, as there seems no reason to be confident
                 that today's new systems are not also tomorrow's legacy
                 systems. This paper argues1. that the main problem is
                 not that the necessary expertise does not exist, but
                 rather, that it is hard for software engineers to
                 become expert;2. that the diversity of the problem
                 domain poses problems for conventional methodological
                 approaches;3. that an approach via systems
                 reengineering patterns can help. We support our
                 contention by means of some candidate patterns drawn
                 from our own experience and published work on
                 reengineering. We discuss the scope of the approach,
                 how work in this area can proceed, and in particular
                 how patterns may be identified and confirmed.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Naumovich:1998:CDF,
  author =       "Gleb Naumovich and George S. Avrunin",
  title =        "A conservative data flow algorithm for detecting all
                 pairs of statements that may happen in parallel",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "6",
  pages =        "24--34",
  month =        nov,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/291252.288213",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:40 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Information about which pairs of statements in a
                 concurrent program can execute in parallel is important
                 for optimizing and debugging programs, for detecting
                 anomalies, and for improving the accuracy of data flow
                 analysis. In this paper, we describe a new data flow
                 algorithm that finds a conservative approximation of
                 the set of all such pairs. We have carried out an
                 initial comparison of the precision of our algorithm
                 and that of the most precise of the earlier approaches,
                 Masticola and Ryder's non-concurrency analysis [8],
                 using a sample of 159 concurrent Ada programs that
                 includes the collection assembled by Masticola and
                 Ryder. For these examples, our algorithm was almost
                 always more precise than non-concurrency analysis, in
                 the sense that the set of pairs identified by our
                 algorithm as possibly happening in parallel is a proper
                 subset of the set identified by non-concurrency
                 analysis. In 132 cases, we were able to use
                 reachability analysis to determine exactly the set of
                 pairs of statements that may happen in parallel. For
                 these cases, there were a total of only 10 pairs
                 identified by our algorithm that cannot actually happen
                 in parallel.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Cook:1998:EBD,
  author =       "Jonathan E. Cook and Alexander L. Wolf",
  title =        "Event-based detection of concurrency",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "6",
  pages =        "35--45",
  month =        nov,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/291252.288214",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:40 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Understanding the behavior of a system is crucial in
                 being able to modify, maintain, and improve the system.
                 A particularly difficult aspect of some system
                 behaviors is concurrency. While there are many
                 techniques to specify intended concurrent behavior,
                 there are few, if any, techniques to capture and model
                 actual concurrent behavior. This paper presents a
                 technique to discover patterns of concurrent behavior
                 from traces of system events. The technique is based on
                 a probabilistic analysis of the event traces. Using
                 metrics for the number, frequency, and regularity of
                 event occurrences, a determination is made of the
                 likely concurrent behavior being manifested by the
                 system. The technique is useful in a wide variety of
                 software engineering tasks, including architecture
                 discovery, reengineering, user interaction modeling,
                 and software process improvement.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Atkinson:1998:EWP,
  author =       "Darren C. Atkinson and William G. Griswold",
  title =        "Effective whole-program analysis in the presence of
                 pointers",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "6",
  pages =        "46--55",
  month =        nov,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/291252.288217",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:40 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Understanding large software systems is difficult.
                 Traditionally, automated tools are used to assist
                 program understanding. However, the representations
                 constructed by these tools often require prohibitive
                 time and space. Demand-driven techniques can be used to
                 reduce these requirements. However, the use of pointers
                 in modern languages introduces additional problems that
                 do not integrate well with these techniques. We present
                 new techniques for effectively coping with pointers in
                 large software systems written in the C programming
                 language and use our techniques to implement a program
                 slicing tool. First, we use a fast, flow-insensitive,
                 points-to analysis before traditional data-flow
                 analysis. Second, we allow the user to parameterize the
                 points-to analysis so that the resulting program slices
                 more closely match the actual program behavior. Such
                 information cannot easily be obtained by the tool or
                 might otherwise be deemed unsafe. Finally, we present
                 data-flow equations for dealing with pointers to local
                 variables in recursive programs. These equations allow
                 the user to select an arbitrary amount of calling
                 context in order to better trade performance for
                 precision. To validate our techniques, we present
                 empirical results using our program slicer on large
                 programs. The results indicate that cost-effective
                 analysis of large programs with pointers is feasible
                 using our techniques.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Jeffords:1998:AGS,
  author =       "Ralph Jeffords and Constance Heitmeyer",
  title =        "Automatic generation of state invariants from
                 requirements specifications",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "6",
  pages =        "56--69",
  month =        nov,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/291252.288218",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:40 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Automatic generation of state invariants, properties
                 that hold in every reachable state of a state machine
                 model, can be valuable in software development. Not
                 only can such invariants be presented to system users
                 for validation, in addition, they can be used as
                 auxiliary assertions in proving other invariants. This
                 paper describes an algorithm for the automatic
                 generation of state invariants that, in contrast to
                 most other such algorithms, which operate on programs,
                 derives invariants from requirements specifications.
                 Generating invariants from requirements specifications
                 rather than programs has two advantages: (1) because
                 requirements specifications, unlike programs, are at a
                 high level of abstraction, generation of and analysis
                 using such invariants is easier, and (2) using
                 invariants to detect errors during the requirements
                 phase is considerably more cost-effective than using
                 invariants later in software development. To illustrate
                 the algorithm, we use it to generate state invariants
                 from requirements specifications of an automobile
                 cruise control system and a simple control system for a
                 nuclear plant. The invariants are derived from
                 specifications expressed in the SCR (Software Cost
                 Reduction) tabular notation.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Allen:1998:FMA,
  author =       "Robert J. Allen and David Garlan and James Ivers",
  title =        "Formal modeling and analysis of the {HLA} component
                 integration standard",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "6",
  pages =        "70--79",
  month =        nov,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/291252.288251",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:40 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "An increasingly important trend in the engineering of
                 complex systems is the design of component integration
                 standards. Such standards define rules of interaction
                 and shared communication infrastructure that permit
                 composition of systems out of independently-developed
                 parts. A problem with these standards is that it is
                 often difficult to understand exactly what they require
                 and provide, and to analyze them in order to understand
                 their deeper properties. In this paper we use our
                 experience in modeling the High Level Architecture
                 (HLA) for Distributed Simulation to show how one can
                 capture the structured protocol inherent in an
                 integration standard as a formal architectural model
                 that can be analyzed to detect anomalies, race
                 conditions, and deadlocks.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Stuurman:1998:LCM,
  author =       "Sylvia Stuurman and Jan van Katwijk",
  title =        "On-line change mechanisms: the software architectural
                 level",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "6",
  pages =        "80--86",
  month =        nov,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/291252.288257",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:40 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Our interest in the field of software architecture is
                 focused on the application in technical systems, such
                 as control systems. Our current research in this field
                 is centered around a real-life case study, a control
                 system for unmanned vehicles transporting containers on
                 the ``Maasvlakte'', an area in the ports of Rotterdam.
                 Important issues in this control system are
                 scalability, evolvability, and on-line change
                 capacities. In this paper, we discuss two mechanisms
                 for on-line change in the distributed control system
                 for the Maasvlakte system, which we have implemented in
                 Java. The software architecture we use is a
                 configuration of distributed processes, communicating
                 according to the subscription model. We will focus on
                 the software architectural aspects of the mechanisms
                 for on-line change. One of these mechanisms is
                 associated with the decoupling of processes as a result
                 of the subscription-based communication model. The
                 other mechanism is based on the late-binding properties
                 of Java.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Mahony:1998:FHS,
  author =       "Michael S. Mahony",
  title =        "Finding a history for software engineering",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "6",
  pages =        "87",
  month =        nov,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/291252.288260",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:40 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Krishnamurthi:1998:TFT,
  author =       "Shriram Krishnamurthi and Matthias Felleisen",
  title =        "Toward a formal theory of extensible software",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "6",
  pages =        "88--98",
  month =        nov,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/291252.288269",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:40 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "As software projects continue to grow in scale and
                 scope, it becomes important to reuse software. An
                 important kind of reuse is extensibility, i.e., the
                 extension of software without accessing existing code
                 to edit or copy it. In this paper, we propose a
                 rigorous, semantics-based definition of software
                 extensibility. Then we illustrate the utility of our
                 definitions by applying them to several programs. The
                 examination shows how programming style affects
                 extensibility and also drives the creation of a variant
                 of an existing design pattern. We consider programs in
                 both object-oriented and functional languages to prove
                 the robustness of our definitions.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Snelting:1998:RCH,
  author =       "Gregor Snelting and Frank Tip",
  title =        "Reengineering class hierarchies using concept
                 analysis",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "6",
  pages =        "99--110",
  month =        nov,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/291252.288273",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:40 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The design of a class hierarchy may be imperfect. For
                 example, a class C may contain a member m not accessed
                 in any C -instance, an indication that m could be
                 eliminated, or moved into a derived class. Furthermore,
                 different subsets of C 's members may be accessed from
                 different C -instances, indicating that it might be
                 appropriate to split C into multiple classes. We
                 present a framework for detecting and remediating such
                 design problems, which is based on concept analysis.
                 Our method analyzes a class hierarchy along with a set
                 of applications that use it, and constructs a lattice
                 that provides valuable insights into the usage of the
                 class hierarchy in a specific context. We show how a
                 restructured class hierarchy can be generated from the
                 lattice, and how the lattice can serve as a formal
                 basis for interactive tools for redesigning and
                 restructuring class hierarchies.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Masuda:1998:ADP,
  author =       "Gou Masuda and Norihiro Sakamoto and Kazuo Ushijima",
  title =        "Applying design patterns to decision tree learning
                 system",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "6",
  pages =        "111--120",
  month =        nov,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/291252.288279",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:40 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "In this paper we describe an application of design
                 patterns to the development of a decision tree learning
                 system. A decision tree learning system constructs a
                 classifier as a form of tree from a given data set. It
                 is required to be as flexible as possible when used in
                 real application domains. Design patterns help us
                 construct reusable software components and construct
                 flexible and extensible systems. The approach employed
                 in this study is as follows. First we examine several
                 decision tree learning systems and identify hot-spots
                 in the systems at points we anticipate future demand
                 for modification and extension of the system. Second we
                 determine which design pattern to apply to each
                 hot-spot. We evaluate the extensibility of the system
                 experimentally. Our experience shows that using design
                 patterns in object-oriented software design allows the
                 easy construction of flexible systems.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Jackson:1998:IDL,
  author =       "Daniel Jackson",
  title =        "An intermediate design language and its analysis",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "6",
  pages =        "121--130",
  month =        nov,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/291252.288282",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:40 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "A simple relational language is presented that has two
                 desirable properties. First, it is sufficiently
                 expressive to encode, fairly naturally, a variety of
                 software design problems. Second, it is amenable to
                 fully automatic analysis. This paper explains the
                 language and its semantics, and describes a new
                 analysis scheme (based on a stochastic boolean solver)
                 that dramatically outperforms existing schemes.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Karasick:1998:AMO,
  author =       "Michael Karasick",
  title =        "The architecture of {Montana}: an open and extensible
                 programming environment with an incremental {C++}
                 compiler",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "6",
  pages =        "131--142",
  month =        nov,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/291252.288284",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:40 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Montana is an open, extensible integrated programming
                 environment for C++ that supports incremental
                 compilation and linking, a persistent code cache called
                 a CodeStore, and a set of programming interfaces to the
                 CodeStore for tool writers. CodeStore serves as a
                 central source of information for compiling, browsing,
                 and debugging. CodeStore contains information about
                 both the static and dynamic structure of the compiled
                 program. This information spans files, macros,
                 declarations, function bodies, templates and their
                 instantiations, program fragment dependencies, linker
                 relocation information, and debugging information.
                 Montana allows the compilation process to be extended
                 and modified [11]. Montana has been used as the basis
                 of a number of tools [1,7], and is also used as the
                 infrastructure of a production compiler, IBM's Visual
                 Age C++ 4.0 [8].",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Disney:1998:IDQ,
  author =       "Anne M. Disney and Philip M. Johnson",
  title =        "Investigating data quality problems in the {PSP}",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "6",
  pages =        "143--152",
  month =        nov,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/291252.288292",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:40 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The Personal Software Process (PSP) is used by
                 software engineers to gather and analyze data about
                 their work. Published studies typically use data
                 collected using the PSP to draw quantitative
                 conclusions about its impact upon programmer behavior
                 and product quality. However, our experience using PSP
                 in both industrial and academic settings revealed
                 problems both in collection of data and its later
                 analysis. We hypothesized that these two kinds of data
                 quality problems could make a significant impact upon
                 the value of PSP measures. To test this hypothesis, we
                 built a tool to automate the PSP and then examined 89
                 projects completed by ten subjects using the PSP
                 manually in an educational setting. We discovered 1539
                 primary errors and categorized them by type, subtype,
                 severity, and age. To examine the collection problem we
                 looked at the 90 errors that represented impossible
                 combinations of data and at other less concrete
                 anomalies in Time Recording Logs and Defect Recording
                 Logs. To examine the analysis problem we developed a
                 rule set, corrected the errors as far as possible, and
                 compared the original and corrected data. This resulted
                 in significant differences for measures such as yield
                 and the cost-performance ratio, confirming our
                 hypothesis. Our results raise questions about the
                 accuracy of manually collected and analyzed PSP data,
                 indicate that integrated tool support may be required
                 for high quality PSP data analysis, and suggest that
                 external measures should be used when attempting to
                 evaluate the impact of the PSP upon programmer behavior
                 and product quality.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Frankl:1998:FES,
  author =       "Phyllis G. Frankl and Oleg Iakounenko",
  title =        "Further empirical studies of test effectiveness",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "6",
  pages =        "153--162",
  month =        nov,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/291252.288298",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:40 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This paper reports on an empirical evaluation of the
                 fault-detecting ability of two white-box software
                 testing techniques: decision coverage (branch testing)
                 and the all-uses data flow testing criterion. Each
                 subject program was tested using a very large number of
                 randomly generated test sets. For each test set, the
                 extent to which it satisfied the given testing
                 criterion was measured and it was determined whether or
                 not the test set detected a program fault. These data
                 were used to explore the relationship between the
                 coverage achieved by test sets and the likelihood that
                 they will detect a fault. Previous experiments of this
                 nature have used relatively small subject programs
                 and/or have used programs with seeded faults. In
                 contrast, the subjects used here were eight versions of
                 an antenna configuration program written for the
                 European Space Agency, each consisting of over 10,000
                 lines of C code. For each of the subject programs
                 studied, the likelihood of detecting a fault increased
                 sharply as very high coverage levels were reached.
                 Thus, this data supports the belief that these testing
                 techniques can be more effective than random testing.
                 However, the magnitudes of the increases were rather
                 inconsistent and it was difficult to achieve high
                 coverage levels.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Kontio:1998:EIR,
  author =       "Jyrki Kontio and Gerhard Getto and Dieter Landes",
  title =        "Experiences in improving risk management processes
                 using the concepts of the Riskit method",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "6",
  pages =        "163--174",
  month =        nov,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/291252.288301",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:40 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This paper describes experiences from two
                 organizations that have used the Riskit method for risk
                 management in their software projects. This paper
                 presents the Riskit method, the organizations involved,
                 case study designs, and findings from case studies. We
                 focus on the experiences and insights gained through
                 the application of the method in industrial context and
                 propose some general conclusions based on the case
                 studies.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Alur:1998:MCH,
  author =       "Rajeev Alur and Mihalis Yannakakis",
  title =        "Model checking of hierarchical state machines",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "6",
  pages =        "175--188",
  month =        nov,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/291252.288305",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:40 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Model checking is emerging as a practical tool for
                 detecting logical errors in early stages of system
                 design. We investigate the model checking of
                 hierarchical (nested) systems, i.e. finite state
                 machines whose states themselves can be other machines.
                 This nesting ability is common in various software
                 design methodologies and is available in several
                 commercial modeling tools. The straightforward way to
                 analyze a hierarchical machine is to flatten it (thus,
                 incurring an exponential blow up) and apply a model
                 checking tool on the resulting ordinary FSM. We show
                 that this flattening can be avoided. We develop
                 algorithms for verifying linear time requirements whose
                 complexity is polynomial in the size of the
                 hierarchical machine. We address also the verification
                 of branching time requirements and provide efficient
                 algorithms and matching lower bounds.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Dwyer:1998:FBM,
  author =       "Matthew B. Dwyer and Corina S. Pasareanu",
  title =        "Filter-based model checking of partial systems",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "6",
  pages =        "189--202",
  month =        nov,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/291252.288307",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:40 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Recent years have seen dramatic growth in the
                 application of model checking techniques to the
                 validation and verification of correctness properties
                 of hardware, and more recently software, systems. Most
                 of this work has been aimed at reasoning about
                 properties of complete systems. This paper describes an
                 automatable approach for building finite-state models
                 of partially defined software systems that are amenable
                 to model checking using existing tools. It enables the
                 application of existing model checking tools to system
                 components taking into account assumptions about the
                 behavior of the environment in which the components
                 will execute. We illustrate the application of the
                 approach by validating and verifying properties of a
                 reusable parameterized programming framework.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Griss:1998:SEP,
  author =       "Martin Griss",
  title =        "Software engineering as a profession: industry and
                 academia working together",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "6",
  pages =        "203--204",
  month =        nov,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/291252.288311",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:40 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Gotterbarn:1998:SEP,
  author =       "Don Gotterbarn",
  title =        "Software engineering as a profession",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "6",
  pages =        "205--206",
  month =        nov,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/291252.295145",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:40 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Shaw:1998:PSE,
  author =       "Mary Shaw",
  title =        "A profession of software engineering: is there a need?
                 {YES}: are we ready? {NO}",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "6",
  pages =        "207--208",
  month =        nov,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/291252.295149",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:40 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Garlan:1998:RAI,
  author =       "D. Garlan and S. Jha and D. Notkin and J. Dingel",
  title =        "Reasoning about implicit invocation",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "6",
  pages =        "209--221",
  month =        nov,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/291252.288312",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:40 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Implicit invocation [SN92, GN91] has become an
                 important architectural style for large-scale system
                 design and evolution. This paper addresses the lack of
                 specification and verification formalisms for such
                 systems. Based on standard notions from process algebra
                 and trace semantics, we define a formal computational
                 model for implicit invocation. A verification
                 methodology is presented that supports linear time
                 temporal logic and compositional reasoning. First, the
                 entire system is partitioned into groups of components
                 (methods) that behave independently. Then, local
                 properties are proved for each of the groups. A precise
                 description of the cause and the effect of an event
                 supports this step. Using local correctness,
                 independence of groups, and properties of the delivery
                 of events, we infer the desired property of the overall
                 system. Two detailed examples illustrate the use of our
                 framework.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Fong:1998:PLA,
  author =       "Philip W. L. Fong and Robert D. Cameron",
  title =        "Proof linking: an architecture for modular
                 verification of dynamically-linked mobile code",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "6",
  pages =        "222--230",
  month =        nov,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/291252.288317",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:40 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  abstract =     "Security flaws are routinely discovered in commercial
                 implementations of mobile code systems such as the Java
                 Virtual Machine (JVM). Typical architectures for such
                 systems exhibit complex interdependencies between the
                 loader, the verifier, and the linker, making them
                 difficult to craft, validate, and maintain. This
                 reveals a software engineering challenge that is common
                 to all mobile code systems in which a static
                 verification phase is introduced before dynamic
                 linking. In such systems, one has to articulate how
                 loading, verification, and linking interact with each
                 other, and how the three processes should be organized
                 to address various security issues. We propose a
                 standard architecture for crafting mobile code
                 verifiers, based on the concept of proof linking. This
                 architecture modularizes the verification process and
                 isolates the dependencies among the loader, verifier,
                 and linker. We also formalize the process of proof
                 linking and establish properties to which correct
                 implementations must conform. As an example, we
                 instantiate our architecture for the problem of Java
                 bytecode verification and assess the correctness of
                 this instantiation. Finally, we briefly discuss
                 alternative mobile code verification architectures
                 enabled by our modularization.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Gupta:1998:ATD,
  author =       "Neelam Gupta and Aditya P. Mathur and Mary Lou Soffa",
  title =        "Automated test data generation using an iterative
                 relaxation method",
  journal =      j-SIGSOFT,
  volume =       "23",
  number =       "6",
  pages =        "231--244",
  month =        nov,
  year =         "1998",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/291252.288321",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:40 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "An important problem that arises in path oriented
                 testing is the generation of test data that causes a
                 program to follow a given path. In this paper, we
                 present a novel program execution based approach using
                 an iterative relaxation method to address the above
                 problem. In this method, test data generation is
                 initiated with an arbitrarily chosen input from a given
                 domain. This input is then iteratively refined to
                 obtain an input on which all the branch predicates on
                 the given path evaluate to the desired outcome. In each
                 iteration the program statements relevant to the
                 evaluation of each branch predicate on the path are
                 executed, and a set of linear constraints is derived.
                 The constraints are then solved to obtain the
                 increments for the input. These increments are added to
                 the current input to obtain the input for the next
                 iteration. The relaxation technique used in deriving
                 the constraints provides feedback on the amount by
                 which each input variable should be adjusted for the
                 branches on the path to evaluate to the desired
                 outcome. When the branch conditions on a path are
                 linear functions of input variables, our technique
                 either finds a solution for such paths in one iteration
                 or it guarantees that the path is infeasible. In
                 contrast, existing execution based approaches may
                 require an unacceptably large number of iterations for
                 relatively long paths because they consider only one
                 input variable and one branch predicate at a time and
                 use backtracking. When the branch conditions on a path
                 are nonlinear functions of input variables, though it
                 may take more then one iteration to derive a desired
                 input, the set of constraints to be solved in each
                 iteration is linear and is solved using Gaussian
                 elimination. This makes our technique practical and
                 suitable for automation.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Gotterbarn:1999:PST,
  author =       "Donald Gotterbarn",
  title =        "A positive step toward a profession: the software
                 engineering code of ethics and professional practice",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "1",
  pages =        "9--14",
  month =        jan,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/308769.308770",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:41 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Finkbine:1999:AFP,
  author =       "Ronald B. Finkbine",
  title =        "{ACM Fellow} profile: {L. Peter Deutsch}",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "1",
  pages =        "21",
  month =        jan,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/308769.308771",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:41 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Neumann:1999:RPCa,
  author =       "Peter G. Neumann",
  title =        "Risks to the public in computers and related systems",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "1",
  pages =        "31--35",
  month =        jan,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/308769.308773",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:41 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Boehm:1999:EST,
  author =       "Barry Boehm",
  title =        "Escaping the software tar pit: model clashes and how
                 to avoid them",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "1",
  pages =        "36--48",
  month =        jan,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/308769.308775",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:41 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "``No scene from prehistory is quite so vivid as that
                 of the mortal struggles of great beasts in the tar pits
                 \ldots{} Large system programming has over the past
                 decade been such a tar pit, and many great and powerful
                 beasts have thrashed violently in it \ldots{} ''
                 Everyone seems to have been surprised by the stickiness
                 of the problem, and it is hard to discern the nature of
                 it. But we must try to understand it if we are to solve
                 it.'' Fred Brooks, 1975. Several recent books and
                 reports have confirmed that the software tar pit is at
                 least as hazardous today as it was in 1975. Our
                 research into several classes of models used to guide
                 software development (product models, process models,
                 property models, success models), has convinced us that
                 the concept of model clashes among these classes of
                 models helps explain much of the stickiness of the
                 software tar-pit problem. We have been developing and
                 experimentally evolving an approach called MBASE ---
                 Model-Based (System) Architecting and Software
                 Engineering --- which helps identify and avoid software
                 model clashes. Section 2 of this paper introduces the
                 concept of model clashes, and provides examples of
                 common clashes for each combination of product,
                 process, property, and success model. Sections 3 and 4
                 introduce the MBASE approach for endowing a software
                 project with a mutually supportive set of models, and
                 illustrate the application of MBASE to an example
                 corporate resource scheduling system. Section 5
                 summarizes the results of applying the MBASE approach
                 to a family of small digital library projects. Section
                 6 presents conclusions to date.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Keller:1999:IWL,
  author =       "Rudolf K. Keller and Bruno Lagu{\"e} and Reinhard
                 Schauer",
  title =        "{International Workshop on Large-Scale Software
                 Composition}",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "1",
  pages =        "49--54",
  month =        jan,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/308769.308777",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:41 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This report summarizes the International Workshop on
                 Large-Scale Software Composition held at the University
                 of Vienna, Austria, on August 28, 1998 in conjunction
                 with the Database and Expert Systems Applications
                 (DEXA'98) conference. An overall forty people attended
                 the workshop consisting of seven presentations and
                 plenary discussions. In the following, we outline the
                 presentations and subsequent discussions in the four
                 workshop sessions, which included Setting the Stage,
                 Component Modeling, Migration towards Components, and
                 Component-based Modelling of Distributed Systems. The
                 workshop report can be found at
                 http://www.iro.umontreal.ca/labs/gelo/iw-lssc98.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Casey:1999:OMS,
  author =       "Richard M. Casey",
  title =        "Object mappings in a software engineering project",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "1",
  pages =        "55--59",
  month =        jan,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/308769.308780",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:41 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "In a software engineering project, business objects
                 were mapped directly to software and database objects.
                 There was a natural correlation between objects in real
                 world systems and their representation as software
                 objects and database objects. This mapping may serve as
                 an effective model for similar projects.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Li:1999:DSS,
  author =       "Baojian Li and Guangzhou Zeng and Zongkai Lin",
  title =        "A domain specific software architecture style for
                 {CSCD} system",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "1",
  pages =        "59--64",
  month =        jan,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/308769.308783",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:41 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This paper proposes a domain-specific software
                 architecture style. In the architecture style we define
                 three software component types: procedure components,
                 object components and agent components. We design a
                 software bus or connector called Tribus to facilitate
                 interactions among these components and specify one way
                 quotation relations between different component types
                 and two-way quotation relations between components of
                 the same type. We also give an application example of
                 the software architecture style in the domain of
                 Computer Supported Collaborative Design (CSCD).",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Xiaoguang:1999:OOD,
  author =       "Zhu Xiaoguang and Wang Dongmu and Hong Bingrong",
  title =        "An object-oriented data framework for virtual
                 environments with hierarchical modeling",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "1",
  pages =        "65--68",
  month =        jan,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/308769.308787",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:41 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Virtual reality technology, which is cyberspace
                 composed of multimedia, is a field of comprehensive
                 technology. It is of three basic feathers, namely,
                 interaction, immersion and imagination so that we have
                 to cope with the need for extremely large data sets,
                 massive amounts of computation, and high-throughput
                 networking. This paper presents an approach for
                 object-oriented data modeling framework of complicated
                 virtual environments. The paper discusses the
                 hierarchical decomposition of objects in virtual
                 environments and reuse of these object data libraries
                 to constitute model of virtual environments. This
                 modeling approach used in the paper makes sure that
                 modeling data can be inherited, modularized, maintained
                 easily so as to control redundant data and reduce the
                 software development time, at the same time, realizes
                 dynamic behaviors of objects to meet the needs of some
                 changes of virtual environments.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Wahl:1999:ORT,
  author =       "Nancy J. Wahl",
  title =        "An overview of regression testing",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "1",
  pages =        "69--73",
  month =        jan,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/308769.308790",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:41 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Regression testing is an important part of the
                 software development life cycle. Many articles have
                 been published lately detailing the different
                 approaches. This article is an overview of regression
                 testing in the following areas: types of regression
                 testing; unit, integration and system level testing,
                 regression testing of global variables, regression
                 testing of object-oriented software, comparisons of
                 selective regression techniques, and cost comparisons
                 of the types of regression testing.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Fuggetta:1999:SRS,
  author =       "Alfonso Fuggetta",
  title =        "Some reflections on software engineering research",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "1",
  pages =        "74--77",
  month =        jan,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/308769.308791",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:41 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The May and July issues of ACM Software Engineering
                 Notes include three stimulating and thought-provoking
                 papers, two by David Lorge Parnas and one by David
                 Notkin. The papers discuss the nature of software
                 engineering research and identify problems and issues
                 that the community is facing. After reading them, I
                 felt compelled to assess the research I have been doing
                 during the past years. These notes are just an attempt
                 to organize and structure in a written form the
                 impressions and concerns that I have derived from this
                 reflection. I hope they can be useful to continue and
                 deepen the discussion on the subject. To anticipate
                 some possible negative reactions to these notes, I
                 admit up front that my comments might appear biased,
                 harsh, and perhaps too pessimistic. Please consider
                 them first and foremost as a sincere critique of
                 myself. I do believe that the only way to solve
                 problems is to address them without any fear or
                 ambiguity. Ignoring or avoiding problems would just
                 mean that we do not have the ability or the courage to
                 solve them.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Drori:1999:ITR,
  author =       "Offer Drori",
  title =        "Integration of text retrieval technology into
                 formatted (conventional) information systems",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "1",
  pages =        "78--80",
  month =        jan,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/308769.308793",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:41 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Conventional information systems are characterized by
                 data management, which is formatted according to the
                 characterization, prepared by a systems analyst, in
                 conjunction with the user of the new system. The
                 operating principles of these systems enable efficient
                 data management and the resolution of a broad range of
                 problems. At times, systems of this nature do not meet
                 the complex needs of an organization, such as the
                 management of data that is difficult to characterize
                 precisely, or the management of occasional activities
                 that do not justify a separate system, etc. Text
                 retrieval technology provides management of ``open''
                 data, as well as a wide range of other data management
                 forms. This paper presents the advantages of
                 integrating text retrieval technology into formatted
                 information systems in order to solve the above
                 problems.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Kokol:1999:MFS,
  author =       "Peter Kokol",
  title =        "Measuring formal specification with $ \alpha
                 $-metric",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "1",
  pages =        "80--81",
  month =        jan,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/308769.308796",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:41 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This paper explains the use of $ \alpha $-metrics in
                 analysing and comparison of various formal
                 specification languages.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Brykczynski:1999:SSI,
  author =       "Bill Brykczynski",
  title =        "A survey of software inspection checklists",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "1",
  pages =        "82",
  month =        jan,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/308769.308798",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:41 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Software inspection processes call for a checklist to
                 provide reviewers with hints and recommendations for
                 finding defects during the examination of a
                 workproduct. Many checklists have been published since
                 Michael Fagan created the inspection process in the
                 mid-1970's. This paper surveys 117 checklists from 24
                 sources. Different categories of checklist items are
                 discussed and examples are provided of good checklist
                 items as well as those that should be avoided.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Weske:1999:RMW,
  author =       "Mathias Weske and Thomas Goesmann and Roland Holten
                 and R{\"u}diger Striemer",
  title =        "A reference model for workflow application development
                 processes",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "2",
  pages =        "1--10",
  month =        mar,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/295666.295667",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:43 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The success of workflow projects to a large extent
                 depends on how workflow application development
                 processes are planned, organized, and conducted. Based
                 on lessons learned from problems encountered during
                 real-world workflow application development projects,
                 this paper presents a reference model for workflow
                 application development processes, which guides project
                 managers and developers through the complex structure
                 of these processes, with the aim of developing more
                 adequate, usable, and reliable workflow applications.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Grinter:1999:SAP,
  author =       "Rebecca E. Grinter",
  title =        "Systems architecture: product designing and social
                 engineering",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "2",
  pages =        "11--18",
  month =        mar,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/295666.295668",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:43 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The production of large and complex systems usually
                 requires the coordination and collaboration of many
                 individuals spread among numerous divisions of a
                 corporation. However, much research examining
                 coordination has focused on the subtleties of
                 interactions between individuals who may work together
                 in the same department. In this paper, I present a
                 study of systems architects and the work that they do
                 to coordinate design across organizational and
                 institutional boundaries. I also describe the processes
                 and tools that the architects use to support their
                 work. The implications of the social processes involved
                 in coordinating the design of large complex systems on
                 the product and those involved in its production are
                 discussed.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Baresi:1999:WWD,
  author =       "L. Baresi and F. Casati and S. Castano and M. G.
                 Fugini and I. Mirbel and B. Pernici",
  title =        "{WIDE} workflow development methodology",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "2",
  pages =        "19--28",
  month =        mar,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/295666.295669",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:43 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The development of workflows (WFs) for complex
                 organizations to be interfaced with existing
                 information systems requires a specific methodological
                 approach to guarantee benefits and effectiveness of the
                 final results. In fact, the WF should be well
                 integrated in the organization both from the technical
                 and the organizational point of view. While the
                 characteristics of the Workflow Management System
                 (WFMS) platform adopted in the implementation are
                 relevant to establish the boundary between the workflow
                 system and other related applications, it is also
                 important that the analysis and design phases are
                 developed independently of those characteristics. The
                 WF development methodology proposed in this paper
                 starts with an analysis phase based on UML, adopted for
                 business process descriptions and business goals. The
                 design phase proposes a pattern-based approach to
                 workflow schemas design, based on the WIDE WF model.
                 This model allows a flexible representation of the
                 exceptions which may occur during WF execution. It also
                 considers the interaction of the WF with external
                 applications and information systems. Finally, the
                 paper briefly discusses the mapping to commercial and
                 prototype WFMSs.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Ludwig:1999:VEC,
  author =       "Heiko Ludwig and Keith Whittingham",
  title =        "Virtual enterprise co-ordinator --- agreement-driven
                 gateways for cross-organisational workflow management",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "2",
  pages =        "29--38",
  month =        mar,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/295666.295670",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:43 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Today's Workflow Management Systems (WfMS) do not
                 distinguish between an external view of a process that
                 is visible outside the organisation and its internal
                 details. Their interfaces are generally aimed at the
                 internal user. This is a problem if one organisation
                 (provider) wants to perform a process on behalf of
                 another (requester) so that it can be initiated and
                 accessed by the requester through an automated
                 interface and, vice versa, that the results can be
                 reported back. This issue gains importance as WfMS are
                 in widespread use today and the trend to outsource
                 non-core business leads to increased service activity
                 between companies. Organisations do not want to make
                 internal information generally available to business
                 partners nor do they wish to restrict their ability to
                 conduct business internally. If organisations enter a
                 business relationship, they define in an agreement the
                 circumstances in which the requester might initiate a
                 process in the provider and exchange further
                 information during the process's performance. This
                 paper describes the Virtual Enterprise Co-ordinator
                 (VEC), a concept for the setup and management of
                 gateways to WfMS-enacted processes for outside
                 organisations on the basis of simple agreements. Using
                 VEC, organisations can provide external partners with a
                 controlled way of accessing WfMS-enacted processes,
                 while retaining the freedom to change the internal
                 details of those processes.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Simone:1999:IMA,
  author =       "Carla Simone and Gloria Mark and Dario Giubbilei",
  title =        "Interoperability as a means of articulation work",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "2",
  pages =        "39--48",
  month =        mar,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/295666.295671",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:43 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The interoperability of systems to support cooperative
                 work requires moving beyond purely technical issues; it
                 also concerns the means and practices that users adopt
                 to articulate their cooperative activities.
                 Articulation has to be supported by a technology which
                 focuses on this higher level of interoperability. This
                 claim is motivated by observing the articulation
                 process of users in real cooperative work practice.
                 Based on this study, the functionality for this
                 technology was designed to help users reconcile
                 different handling and perspectives on shared objects
                 in their cooperative work. The paper presents the
                 architecture of an application infrastructure centered
                 on the identified interoperability issues and focuses
                 on the design of a specialized module, called
                 reconciler, which provides the above functionality. The
                 current state of its implementation together with
                 identifying open research problems conclude the
                 paper.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Hilerio:1999:HEI,
  author =       "Israel Hilerio and Weidong Chen",
  title =        "{Herbal-T}, enabling integration, interoperability,
                 and reusability of {Internet} components",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "2",
  pages =        "49--58",
  month =        mar,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/295666.295672",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:43 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Herbal-T introduces an architecture where Internet
                 component integration, interoperability, and component
                 instantiation are the base for information flow
                 coordination. This architecture introduces a framework
                 for combining object functionality across the Internet
                 to create new Internet applications. These new
                 applications are defined in terms of active
                 relationships. The concept of active relations as found
                 in active databases is extended to define a new
                 paradigm for creating Internet applications. In
                 addition, Internet component interoperability is
                 achieved using Applets, Java Applications, CORBA and
                 RMI. This paper presents how the Herbal-T architecture
                 support extends active relations to create an
                 integration, interoperability, and reusability
                 framework.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Borgida:1999:TEW,
  author =       "Alex Borgida and Takahiro Murata",
  title =        "Tolerating exceptions in workflows: a unified
                 framework for data and processes",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "2",
  pages =        "59--68",
  month =        mar,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/295666.295673",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:43 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Practical workflow systems need to be able to tolerate
                 deviations from the initial process model because of
                 un-anticipated situations. They should also be able to
                 accommodate deviations in the format of the forms and
                 data being manipulated. We offer a framework for
                 treating both kinds of deviations uniformly, by
                 applying ideas from programming languages (with
                 workflow agents as potential on-line exception
                 handlers) to workflows that have been reified as
                 objects in classes with special attributes. As a
                 result, only a small number of new constructs, which
                 can be applied orthogonally, need to be introduced.
                 Special run-time checks are used to deal with the
                 consequences of permitting deviations from the norm to
                 persist as violations of constraints.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Hull:1999:DWS,
  author =       "Richard Hull and Fran{\c{c}}ois Llirbat and Eric Siman
                 and Jianwen Su and Guozhu Dong and Bharat Kumar and
                 Gang Zhou",
  title =        "Declarative workflows that support easy modification
                 and dynamic browsing",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "2",
  pages =        "69--78",
  month =        mar,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/295666.295674",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:43 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "A new programming paradigm named ``Vortex'' is
                 introduced for specifying a wide range of
                 decision-making activities including, in particular,
                 workflows. In Vortex workflows are specified
                 declaratively. A particular emphasis is on
                 ``object-focused'' workflows, i.e., workflows focused
                 on how individual input objects should be processed
                 within an organization. Such workflows arise commonly
                 in practice, including insurance claims processing, and
                 many electronic commerce applications, and in the area
                 of Customer Care, e.g., web-based storefronts. Vortex
                 workflows are ``attribute-centric'', because they are
                 centered around how the attribute values for an input
                 object are gathered and computed. Initially, only a few
                 attributes of an input object have assigned values.
                 During processing of the object, additional attribute
                 values may be assigned by external modules, or by
                 internal modules, including ``decision modules''.
                 Decision modules include ``attribute rules'' that
                 specify contributions to specific attribute values;
                 these are combined with one of a broad family of
                 available semantics. In Vortex, enabling conditions are
                 used to determine what attributes should be evaluated.
                 A novel choice-based execution model provides a general
                 framework for optimization strategies. The use of
                 enabling conditions, attribute rules and declarative
                 semantics makes Vortex workflows easier to modify and
                 refine than traditional, procedurally specified
                 workflows. Vortex supports modularity and permits the
                 natural intermixing of Vortex workflows with
                 traditional, procedural workflows. The paper introduces
                 a novel spreadsheet-like interface for dynamic browsing
                 of Vortex executions.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Heinl:1999:CAF,
  author =       "Petra Heinl and Stefan Horn and Stefan Jablonski and
                 Jens Neeb and Katrin Stein and Michael Teschke",
  title =        "A comprehensive approach to flexibility in workflow
                 management systems",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "2",
  pages =        "79--88",
  month =        mar,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/295666.295675",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:43 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Flexibility has recently grown to be one of the major
                 research topics in the area of workflow management. In
                 this paper we focus on flexibility of workflow
                 management applications, in contrast to flexibility of
                 the implementation of workflow management systems. In a
                 case study we show the necessity of flexibility in
                 workflow management applications. This flexibility can
                 roughly be classified into flexibility, which is
                 provided by the workflow type, and flexibility, which
                 goes beyond the scope of the workflow type and has
                 additionally to be provided by a workflow management
                 system. We call this flexibility by selection and
                 flexibility by adaption, respectively. We point out
                 that the modeling process as a main aspect of
                 flexibility by adaption has to be treated as a CSCW
                 scenario. The classification leads to a structured
                 overall concept for flexibility in workflow management
                 applications.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Li:1999:GCN,
  author =       "Du Li and Zhenghao Wang and Richard R. Muntz",
  title =        "``{Got COCA}?'' A new perspective in building
                 electronic meeting systems",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "2",
  pages =        "89--98",
  month =        mar,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/295666.295676",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:43 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "In a previous paper[11], we presented COCA
                 (Collaborative Objects Coordination Architecture) as a
                 generic framework for developing collaborative systems.
                 COCA advocates separation of coordination policies from
                 general-purpose computations in collaborative systems
                 so that the former can be modeled in a high-level
                 specification language. Reuse of both coordination
                 policies and collaboration tools can be achieved. This
                 paper overviews the COCA model and focuses on the
                 application of COCA in building real-life systems. We
                 prototyped a modest set of tools for electronic meeting
                 systems (EMSs) to show how they can be used to support
                 both unstructured and structured meetings, with only
                 changes in the coordination policies and no changes to
                 the tools themselves. A subset of Robert's Rules of
                 Order[21] was formalized and specified as an example of
                 control of formal structured meetings. Finally the
                 current status and the future directions are
                 summarized.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Churchill:1999:VEW,
  author =       "Elizabeth F. Churchill and Sara Bly",
  title =        "Virtual environments at work: ongoing use of {MUDs} in
                 the workplace",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "2",
  pages =        "99--108",
  month =        mar,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/295666.295677",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:43 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "In recent years much attention has been paid to
                 network-based, distributed environments like text-based
                 MUDs and MOOs for supporting collaborative work. Such
                 environments offer a shared virtual world in which
                 interactions can take place irrespective of the actual
                 physical proximity or distance of interactants.
                 Although these environments have proven successful
                 within social, recreational and educational domains,
                 few data have been reported concerning use of such
                 systems in the workplace. In this paper we summarize
                 in-depth interviews with 8 MUDders from a software
                 research and development community where a MUD has been
                 operational and actively used for a number of years.
                 The interviews suggest that the MUD fills a valuable
                 communication niche for this workgroup, being used both
                 synchronously and asynchronously to enable the
                 establishment of new contacts and the maintenance of
                 existing contacts. These observations are discussed in
                 the context of the organization under study.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Takao:1999:ENB,
  author =       "Shinji Takao",
  title =        "The effects of narrow-band width multipoint
                 videoconferencing on group decision making and turn
                 distribution",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "2",
  pages =        "109--116",
  month =        mar,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/295666.295678",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:43 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This study reports an experiment that examines the
                 effects that face-to-face meetings (FF) and two modes
                 of videoconferencing, switching video (SV), which shows
                 only the current speaker, and mixing video (MV), which
                 shows each group member simultaneously, have on turn
                 distribution and the quality of small group decision
                 making. The subjects were 200 undergraduate students
                 and the task was the NASA Moon Survival Problem.
                 Multiple comparison tests indicated that MV yielded
                 significantly higher group decision quality than FF.
                 The other pairs, FF-SV and SV-MV, showed no significant
                 differences. With regard to turn taking, there was
                 almost no difference between SV-MV.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Herbsleb:1999:MRC,
  author =       "James D. Herbsleb",
  title =        "Metaphorical representation in collaborative software
                 engineering",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "2",
  pages =        "117--126",
  month =        mar,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/295666.295679",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:43 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Finding a useful abstract representation is
                 fundamental to solving many difficult problems in
                 software engineering. In order to better understand how
                 representations are actually used in key collaborative
                 software engineering tasks, this empirical study
                 examined all of the spoken representations of software
                 behavior in 9 domain analysis sessions. It found that
                 about 70\% of them were metaphorical, representing
                 system behavior as physical movement of objects, as
                 perceptual processes, or in anthropomorphic terms
                 ascribing beliefs and desires to the system. The
                 pattern of use of these representations indicates (1)
                 that they were not merely temporary placeholders, but
                 rather their use persisted even when a specialized and
                 more formal vocabulary had been developed, and (2) the
                 metaphoric descriptions appear to reflect actual use of
                 metaphor, rather than just a choice of vocabulary. The
                 use of metaphor is explained in terms of how well they
                 serve human cognitive abilities and collaborative
                 needs. The predominance of metaphorical representations
                 in synchronous collaborative sessions raises important
                 issues about the possible misleading effects of
                 metaphorical thinking. It also raises questions about
                 the compatibility of the spoken representations with
                 other representations (e.g., diagrams, specification
                 languages) that trigger, and capture the results of,
                 the verbal collaborative work.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Bose:1999:WWA,
  author =       "Prasanta Bose and Xiaoqing Zhou",
  title =        "{WWAC}: {WinWin} abstraction based decision
                 coordination",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "2",
  pages =        "127--136",
  month =        mar,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/295666.295680",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:43 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Distributed engineering of complex software artifacts
                 require collaboration of multiple independent
                 stakeholders over extended periods of time. The
                 independent decision changes, task executions, resource
                 usages and other activities of the stakeholders may
                 interact causing problems where mutual dependencies
                 exist due to global activity ordering, resource
                 sharing, product integrity, and other global
                 constraints. Stakeholder coordination is required to
                 ensure satisfaction of the global constraints. The
                 paper presents an approach (WWAC) to the problem of
                 stakeholder coordination for distributed design
                 decision making that exploits an active meta-model
                 arising out of stakeholder collaboration and captures
                 abstractions of design decisions and their
                 dependencies.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Jensen:1999:CAA,
  author =       "David Jensen and Yulin Dong and Barbara Staudt Legner
                 and Eric K. McCall and Leon J. Osterweil and Stanley M.
                 {Sutton, Jr.} and Alexander Wise",
  title =        "Coordinating agent activities in knowledge discovery
                 processes",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "2",
  pages =        "137--146",
  month =        mar,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/295666.295681",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:43 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Knowledge discovery in databases (KDD) is an
                 increasingly widespread activity. KDD processes may
                 entail the use of a large number of data manipulation
                 and analysis techniques, and new techniques are being
                 developed on an ongoing basis. A challenge for the
                 effective use of KDD is coordinating the use of these
                 techniques, which may be highly specialized,
                 conditional and contingent. Additionally, the
                 understanding and validity of KDD results can depend
                 critically on the processes by which they were derived.
                 We propose to use process programming to address the
                 coordination of agents in the use of KDD techniques. We
                 illustrate this approach using the process language
                 Little-JIL to program a representative bivariate
                 regression process. With Little-JIL programs we can
                 clearly capture the coordination of KDD activities,
                 including control flow, pre- and post-requisites,
                 exception handling, and resource usage.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Girgensohn:1999:SWR,
  author =       "Andreas Girgensohn",
  title =        "Supporting the writing of reports in a hierarchical
                 organization",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "2",
  pages =        "147--156",
  month =        mar,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/295666.295682",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:43 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "In many hierarchical companies, reports from several
                 independent groups must be merged to form a single,
                 company-wide report. This paper describes a process and
                 system for creating and structuring such reports and
                 for propagating contributions up the organization. The
                 system has been in regular use, in-house, by about 30
                 users for over a year to create monthly status reports.
                 Our experiences indicate that it is possible to change
                 a monthly reporting practice so that the system is easy
                 to use, improves the quality of the written report,
                 fosters collaboration across projects and creates a
                 corporate memory for the company. These results were
                 achieved as a consequence of our design effort to
                 directly support the hierarchical and collaborative
                 process of creating and assembling the report within
                 the organization. User feedback has led to many
                 improvements in the usability and functionality of the
                 system. Further enhancements using information
                 retrieval and text summarization techniques are in
                 progress.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Vishik:1999:KSQ,
  author =       "Claire Vishik and Andrew B. Whinston",
  title =        "Knowledge sharing, quality, and intermediation",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "2",
  pages =        "157--166",
  month =        mar,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/295666.295683",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:43 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Informal publishing flourished in the World Wide Web
                 environment, where every user with a sufficient level
                 of access can become a publisher. Although it appears
                 that in such an environment intermediation in the
                 distribution and sharing of information becomes
                 unnecessary, the uneven quality of information and
                 resulting quality uncertainty of information users,
                 together with the increased search efforts, represent a
                 sufficient reason for information and knowledge
                 intermediaries to preserve and even reinforce their
                 roles. Large-scale efforts in knowledge management
                 pursued by industry leaders highlight the need for
                 ``new'' intermediation. The paper focuses on economic
                 and business issues in the distribution and sharing of
                 Internet based information and digital products. We
                 address the inefficiency of the pure exchange model in
                 ``information markets'' that is analyzed based on
                 double coincidence of wants and the lack of discernment
                 on the part of users (many of them occasional users)
                 about the market and intrinsic value of informational
                 and digital products. These inefficiencies can be
                 remedied with the introduction of recognizable
                 currencies, which do not have to be of monetary nature,
                 and the situation can be further improved with
                 intermediation. We conclude that ``virtual
                 communities'' and intermediation are important in
                 ameliorating the efficiency of the distribution of the
                 electronic information and quality of informational
                 goods. This point of view is supported by the success
                 of the new Internet-based intermediaries, such as
                 Yahoo.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Berchtold:1999:SSA,
  author =       "Stefan Berchtold and Alexandros Biliris and Euthimios
                 Panagos",
  title =        "{SaveMe}: a system for archiving electronic documents
                 using messaging groupware",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "2",
  pages =        "167--176",
  month =        mar,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/295666.295684",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:43 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Today, organizations deal with an ever-increasing
                 number of documents that have to be archived because
                 they are either related to their core business (e.g.,
                 product designs) or needed to meet corporate or legal
                 retention requirements (e.g., voucher). In this paper,
                 we present the architecture and prototype
                 implementation of SaveMe, a document archival system
                 that is based on network-centric groupware such as
                 Internet standards-based messaging systems. In SaveMe,
                 the actions of archiving, retrieving, and classifying
                 documents are similar to the actions of sending,
                 retrieving, and classifying email into folders. SaveMe
                 leverages existing messaging infrastructures --- the
                 one common denominator sitting on every computer is
                 email --- and, thus, it does not require individual
                 users and IT personnel to learn a new technology. The
                 resulting environment is not intrusive, easier to
                 administer, and a lot easier to deploy.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Schuster:1999:CMA,
  author =       "Hans Schuster and Jens Neeb and Ralf Schamburger",
  title =        "A configuration management approach for large workflow
                 management systems",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "2",
  pages =        "177--186",
  month =        mar,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/295666.295686",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:43 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Scalability to large, heterogeneous, and distributed
                 environments is an important requirement for workflow
                 management systems (WfMS). As a consequence, the
                 management of the configuration of a WfMS installation
                 becomes a key issue. This paper proposes an approach
                 for managing the configuration of WfMS together with an
                 assignment strategy for workflow instances. Separating
                 the logical issues of the workflow model from the
                 physical configuration of a WfMS is the basis of our
                 strategy. A formalization of physical organizational
                 requirements in a WfMS configuration covering access
                 rights, usage policies, and costs for the access to
                 WfMS servers is presented and used in the assignment
                 strategy for workflow instances. The results of our
                 approach fit well for many existing WfMS and also for
                 the reference architecture of the Workflow Management
                 Coalition.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Zhao:1999:TWM,
  author =       "J. Leon Zhao and Edward A. Stohr",
  title =        "Temporal workflow management in a claim handling
                 system",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "2",
  pages =        "187--195",
  month =        mar,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/295666.295687",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:43 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Temporal workflow management is important for
                 processes that are time-driven. Claim handling, which
                 requires the documentation, diagnosis, and resolution
                 of customer claims due to faulty products or
                 unsatisfactory services, is an example of such a
                 process because fast turnaround is critical for
                 customer satisfaction. However, little research has
                 been reported in this area, especially at the policy
                 level. In this paper, we develop a framework for
                 temporal workflow management, which includes issues
                 such as turnaround time predication, time allocation,
                 and task prioritization. We propose also the use of
                 reward functions to guide workers' behavior with the
                 goal of increasing efficiency while allowing
                 flexibility.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Estublier:1999:BFP,
  author =       "Jacky Estublier and Mahfound Amiour and Samir Dami",
  title =        "Building a federation of process support systems",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "2",
  pages =        "197--206",
  month =        mar,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/295666.295689",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:43 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The effort in software process support has focused so
                 far on modeling and enacting processes. A certain
                 amount of work has been done, but little has reached a
                 satisfactory level of maturity and acceptance. In our
                 opinion, this is due to the difficulty for a system to
                 accommodate the very numerous aspects involved in
                 software processes. A complete process support should
                 cover topics ranging from low level tasks (like
                 compiling) to organizational and strategic tasks. This
                 includes process enhancement, resource management and
                 control, cooperative work, etc. The environment must
                 also be convenient for software engineers, team
                 leaders, managers and so on; it must be able to
                 describe details for efficient execution, and be high
                 level for capturing, understanding, etc. As a matter of
                 fact, the few tools that have reached sufficient
                 maturity have focussed on a single topic and addressed
                 a single class of users. It is our claim that no single
                 system can provide a satisfactory solution except in a
                 clearly defined subdomain. Thus we shifted our
                 attention from finding the universal system to finding
                 ways to make many different systems cooperate with
                 their associated formalisms and process engines. This
                 paper presents a novel approach for software process
                 support environments based on a federation of
                 heterogeneous and autonomous components. The approach
                 has been implemented and experimented in the APEL
                 environment. It is shown which architecture and
                 technology is involved, how it works, which
                 interoperability paradigms have been used, which
                 problems we have solved and which issues are still
                 under study.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Ramloll:1999:MEU,
  author =       "Rameshsharma Ramloll and John A. Mariani",
  title =        "Moksha: exploring ubiquity in event filtration-control
                 at the multi-user desktop",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "2",
  pages =        "207--216",
  month =        mar,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/295666.295690",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:43 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Collaborative systems need to provide some means for
                 users to be aware of peer activities. Common approaches
                 involve broadcasting events generated as a result of a
                 particular user's actions at the interface to others.
                 Rather than flooding users with information about all
                 activities occurring in the shared environment,
                 filtration techniques allow each user to be exposed to
                 relevant awareness information. Such techniques are
                 often based on user configurable agents. Unfortunately,
                 these so far do not support satisfactorily the
                 improvisational nature of collaborative activities.
                 This is because user configuration is effective mainly
                 in cases where interactions can be anticipated and
                 where configuration plans can be drawn. It is also
                 difficult for a configurable agent to capture the
                 diversity and the complex interrelationships between
                 collaborative activities. In highly dynamic
                 collaborative environments, the need to synchronise
                 configurations with rapidly evolving needs imposes a
                 heavy task load on participants. In Moksha, our
                 prototypical multi-user desktop, this problem is
                 addressed by extending the desktop metaphor and
                 automating the filtration control process so that it
                 becomes ubiquitous to the user. The cross-client
                 linkage of the desktop interface elements, the use of
                 multi-media and its browsing techniques are the main
                 components underlying our strategy.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Prince:1999:DIO,
  author =       "Robert Prince and Jianwen Su and Hong Tang and
                 Yonggang Zhao",
  title =        "The design of an interactive online help desk in the
                 {Alexandria} Digital Library",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "2",
  pages =        "217--226",
  month =        mar,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/295666.295692",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:43 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "In large software systems such as digital libraries,
                 electronic commerce applications, and customer support
                 systems, the user interface and system are often
                 complex and difficult to navigate. It is necessary to
                 provide users with interactive online support to help
                 users learn how to effectively use these applications.
                 Such online help facilities can include providing
                 tutorials and animated demonstrations, synchronized
                 activities between users and system supporting staff
                 for real time instruction and guidance, multimedia
                 communication with support staff such as chat, voice,
                 and shared whiteboards, and tools for quick
                 identification of user problems. In this paper, we
                 investigate how such interactive online help support
                 can be developed and provided in the context of a
                 working system, the Alexandria Digital Library (ADL)
                 for geospatially-referenced data. We developed an
                 online help system, AlexHelp!. AlexHelp! supports
                 collaborative sessions between the user and the
                 librarian (support staff) that include activities such
                 as map browsing and region selection, recorded
                 demonstration sessions for the user, primitive tools
                 for analyzing user sessions, and channels for voice and
                 text based communications. The design of AlexHelp! is
                 based on user activity logs, and the system is a
                 light-weight software component that can be easily
                 integrated into the ADL user interface client. A
                 prototype of AlexHelp! is developed and integrated into
                 the ADL client; both the ADL client and AlexHelp! are
                 written in Java.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Brennan:1999:WDE,
  author =       "Susan E. Brennan and Justina O. Ohaeri",
  title =        "Why do electronic conversations seem less polite? the
                 costs and benefits of hedging",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "2",
  pages =        "227--235",
  month =        mar,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/295666.295942",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:43 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Electronic conversations often seem less polite than
                 spoken conversations. The usual explanation for this is
                 that people who are not physically copresent become
                 depersonalized and less inhibited by social norms.
                 While this explanation is intuitively appealing, we
                 consider another possibility, based on the costs of
                 producing ``polite'' utterances when speaking versus
                 when typing. We examined a corpus of conversations
                 generated by 26 three-person groups who interacted
                 either face-to-face or electronically to do a
                 collaborative memory task. We coded hedges (which mark
                 an utterance as provisional) and questions (which
                 display doubt or invite input from others), as people
                 presented their own recollections, accepted, modified,
                 or rejected those of others, and tried to reach
                 consensus. Both of these devices are associated with
                 politeness. For most people, hedging is more difficult
                 when typing than when speaking because additional words
                 are required, while marking an utterance as a question
                 is equally easy in both media. The two groups made
                 somewhat different use of these devices: Face-to-face
                 groups hedged more than electronic groups, but both
                 groups used questions just as often. We discuss how
                 these and other differences emerge from the costs and
                 affordances of communication media.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Grinter:1999:WWP,
  author =       "Rebecca E. Grinter",
  title =        "{WACC'99} workshop program",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "2",
  pages =        "237--238",
  month =        mar,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/295666.295696",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:43 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Grinter:1999:WT,
  author =       "Rebecca E. Grinter",
  title =        "{WACC'99} tutorials",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "2",
  pages =        "239--240",
  month =        mar,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/295666.295697",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:43 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Parnas:1999:CR,
  author =       "David Lorge Parnas",
  title =        "On code reuse",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "3",
  pages =        "4",
  month =        may,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/311963.311968",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:45 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  note =         "See response \cite{Gotterbarn:1999:CRR}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Gotterbarn:1999:CRR,
  author =       "Don Gotterbarn and Keith Miller and Simon Rogerson",
  title =        "On code reuse: a response",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "3",
  pages =        "4--6",
  month =        may,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/311963.311971",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:45 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  note =         "See \cite{Parnas:1999:CR}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Jazayeri:1999:IS,
  author =       "Mehdi Jazayeri",
  title =        "Invitation to {SSR}",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "3",
  pages =        "7",
  month =        may,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/311963.311973",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:45 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Ghezzi:1999:IO,
  author =       "Carlo Ghezzi",
  title =        "{ICSE} 2000 opportunity",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "3",
  pages =        "8",
  month =        may,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/311963.311974",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:45 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Leciston:1999:AFP,
  author =       "David John Leciston",
  title =        "{ACM Fellow} profile: {Larry E. Druffel}",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "3",
  pages =        "9--10",
  month =        may,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/311963.311975",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:45 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Eickelmann:1999:AFPa,
  author =       "Nancy Eickelmann",
  title =        "{ACM Fellow} profile: {David Lorge Parnas}",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "3",
  pages =        "10--14",
  month =        may,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/311963.311977",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:45 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Doernhoefer:1999:SNSa,
  author =       "Mark Doernhoefer",
  title =        "Surfing the net for {{\booktitle{Software Engineering
                 Notes}}}",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "3",
  pages =        "15--24",
  month =        may,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/311963.311980",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:45 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Poulin:1999:WIS,
  author =       "Jeffrey S. Poulin and Don Batory and Larry Latour",
  title =        "{9th Workshop on Institutionalizing Software Reuse
                 (WISR '9)} workshop summary",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "3",
  pages =        "29--31",
  month =        may,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/311963.311989",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:45 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "What has the field of reuse accomplished? Where can we
                 declare success? Where should we take the blame for
                 failure? The invitees to WISR recently met in Austin,
                 Texas to address these questions and to help determine
                 the direction of future reuse research and practice.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Edwards:1999:SRP,
  author =       "Stephen H. Edwards",
  title =        "The state of reuse: perceptions of the reuse
                 community",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "3",
  pages =        "32--36",
  month =        may,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/311963.311992",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:45 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The Ninth Workshop on Institutionalizing Software
                 Reuse (WISR9) was held January 7-9, 1999, bringing
                 together established reuse researchers from academia
                 and industry. On the first day of the workshop, a
                 survey was taken to collect feedback about the reuse
                 community's collective beliefs and disagreements.
                 Preliminary results were then shared with the
                 participants during the last plenary session of the
                 workshop. This article presents the results of the
                 survey, which capture the opinions of an important
                 segment of the reuse community.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Basili:1999:NWS,
  author =       "Victor R. Basili and Laszlo Belady and Barry Boehm and
                 Frederick Brooks and James Browne and Richard DeMillo
                 and Stuart I. Feldman and Cordell Green and Butler
                 Lampson and Duncan Lawrie and Nancy Leveson and Nancy
                 Lynch and Mark Weiser and Jeannette Wing",
  title =        "{NSF Workshop on a Software Research Program for the
                 21st Century}",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "3",
  pages =        "37--44",
  month =        may,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/311963.311993",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:45 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Brilliant:1999:ERS,
  author =       "Susan S. Brilliant and John C. Knight",
  title =        "{Empirical Research in Software Engineering}: a
                 workshop",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "3",
  pages =        "44--52",
  month =        may,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/311963.311998",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:45 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Lutz:1999:RBP,
  author =       "Michael J. Lutz and J. Fernando Naveda",
  title =        "{RIT}'s {BS} program in software engineering: a status
                 report",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "3",
  pages =        "53--55",
  month =        may,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/311963.312000",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:45 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "In the fall of 1996, the Rochester Institute of
                 Technology (RIT) enrolled the first students in its
                 undergraduate software engineering program. To the best
                 of our knowledge, this was the first program in the
                 U.S. leading to a Bachelor of Science in Software
                 Engineering. This note is meant to apprise the readers
                 of SEN of both the existence and current status of our
                 program, and to contribute to the on-going conversation
                 vis-{\`a}-vis the proper education of professional
                 software developers.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Prechelt:1999:SDS,
  author =       "Lutz Prechelt",
  title =        "The surprising dynamics of a simple year 2000 bug",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "3",
  pages =        "56--57",
  month =        may,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/311963.312002",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:45 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "These are the reactions (and an analysis of their
                 reasons) of a very simple program containing a rather
                 simple form of century-dependent code. These reactions
                 are extremely surprising and emerge from an interesting
                 daisy-chain of effects.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Aharonian:1999:SPI,
  author =       "Greg Aharonian",
  title =        "17,500 software patents to issue in 1998",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "3",
  pages =        "58--62",
  month =        may,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/311963.312004",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:45 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Based on an analysis of 3336 software patents issued
                 circa January/August of 1998, I have put together the
                 following statistics. Simply put, in 1998 and 1999 the
                 PTO will issue 40,000 software patents, ten times the
                 amount issued six years earlier in 1992 and 1993,
                 without ten times the resources.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Vesterinen:1999:ICE,
  author =       "Petri Vesterinen",
  title =        "Issues in calibrating effort estimation models",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "3",
  pages =        "63--65",
  month =        may,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/311963.312006",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:45 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This paper discusses some important issues when
                 calibrating, or developing effort estimation models for
                 software projects. The author has developed and
                 calibrated several effort estimation models within
                 Nokia Corporation. The paper takes use of the
                 experience gained in those situations.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Kirner:1999:EUC,
  author =       "D. Kirner and R. Porter and P. Punniamoorthy and M.
                 Schuh and D. Shoup and S. Tindall and D. Umphress",
  title =        "Extending use cases throughout the software
                 lifecycle",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "3",
  pages =        "66--68",
  month =        may,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/311963.312014",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:45 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The relevance of use cases throughout the software
                 development life cycle is considered in the context of
                 an actual project. Extensions, called behavior case and
                 test cases are proposed to address design and testing
                 activities.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{P:1999:MDT,
  author =       "Puppydog P. O. P. and L. B. S. Raccoon",
  title =        "Multiple downcasting techniques",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "3",
  pages =        "69--75",
  month =        may,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/311963.312008",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:45 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "In this paper, we describe and compare techniques that
                 implement multiple downcasting in strongly-typed
                 languages. We conclude that multimethods stand out as
                 the single best technique. In the first section, we
                 describe seven commonly used techniques. In the second
                 section, we compare these seven techniques using ten
                 criteria. And, in the third section, we comment on some
                 additional techniques. Multiple downcasting occurs so
                 often that developers use a variety of terms to
                 describe it, and a variety of language constructs and
                 patterns to implement it. ``Feed the animals,''
                 ``driver-vehicle,'' and ``parallel hierarchies'' are
                 well-known examples that require multiple downcasting.
                 ``Multiple type dispatch'' and ``covariant
                 subclassing'' identify different facets of multiple
                 downcasting. ``Dynamic type casting,'' ``typecase
                 statements,'' and the ``visitor pattern'' are
                 frequently used to implement multiple downcasting. We
                 believe that multiple downcasting is not a mistake or
                 the result of poor program design, rather multiple
                 downcasting is a specific technique that implements a
                 specific kind of application semantics. In the animal
                 hierarchy shown in Figure 1, cows eat grass, wolves eat
                 meat, and in the superclass, animals eat food. The
                 generalization that animals eat food is imprecise: it
                 ignores the facts that cows only eat grass and wolves
                 only eat meat. So, how should developers write a
                 function to safely ``feed the animals'' without getting
                 the types mixed up? In Program 1, we show how a
                 developer might like to ``feed the animals'' in C++.
                 The {\tt feed\_unsafely} function may fail, while the
                 {\tt feed\_safely} function works properly for all
                 combinations of foods and animals. The animal hierarchy
                 will not compile in C++, because the eat method is
                 covariant. In this paper, we elaborate ideas and
                 examples from A Middle-Out Concept of Hierarchy. We
                 adapted the ``feed the animals'' example from Are Cows
                 Animals? by Shang.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Hong:1999:CAS,
  author =       "Liu Hong and Lin Zongkai and Zeng Guangzhou",
  title =        "A construction approach for software agents using
                 components",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "3",
  pages =        "76--79",
  month =        may,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/311963.312017",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:45 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This paper presents a construction approach for
                 software agents. A software agent is regarded as a main
                 frame plus some components, and it is constructed by
                 selecting suitable main frame and software components,
                 assembling and running through the control mechanism on
                 the main frame. The multi-agent system is organised on
                 the Client/Server model. The developed system based on
                 this method profits from software reuse in the
                 distributed environment.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Adams:1999:FRI,
  author =       "Tom Adams",
  title =        "A formula for the re-inspection decision",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "3",
  pages =        "80",
  month =        may,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/311963.312024",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:45 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Various recommendations concerning the re-inspection
                 decision can be found in the literature. Some are based
                 on general assumptions or estimates concerning the
                 downstream cost of defects and the proportion of
                 defects that get past the inspection ``filter''. None
                 of these recommendations allow you to work with your
                 own data or assumptions concerning specific types of
                 documents. This article provides a way to make the
                 re-inspection decision using your own data.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Holmes:1999:SEW,
  author =       "Neville Holmes",
  title =        "Software engineering: to be or what to be?",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "3",
  pages =        "81--83",
  month =        may,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/311963.312025",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:45 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This note reviews aspects of professionalism as
                 related to computers, questions the structuring of
                 responsibilities in software development, and commends
                 subsuming overspecialized branches of engineering, such
                 as Computer Systems Engineering and Software
                 Engineering, within a more general discipline of Data
                 Engineering.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Kilov:1999:BSW,
  author =       "Haim Kilov",
  title =        "{Behavioral Semantics Workshop} (call for papers)",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "4",
  pages =        "3",
  month =        jul,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/329155.329156",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:46 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Eickelmann:1999:AFPb,
  author =       "Nancy Eickelmann",
  title =        "{ACM Fellow} profile: {Barbara G. Ryder}",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "4",
  pages =        "13--14",
  month =        jul,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/329155.329157",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:46 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Doernhoefer:1999:SNSb,
  author =       "Mark Doernhoefer",
  title =        "Surfing the net for {{\booktitle{Software Engineering
                 Notes}}}",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "4",
  pages =        "15--25",
  month =        jul,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/329155.329158",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:46 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Neumann:1999:RPCb,
  author =       "Peter G. Neumann",
  title =        "Risks to the public in computers and related systems",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "4",
  pages =        "26--29",
  month =        jul,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/329155.329159",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:46 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Conn:1999:NCS,
  author =       "Richard Conn",
  title =        "Notes from the 12th Conference on Software Engineering
                 Education and Training {(CSEET)} and 13th {SIGCSE}
                 Technical Symposium on Computer Science Education
                 {(CSE)}",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "4",
  pages =        "30--32",
  month =        jul,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/329155.329160",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:46 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Richardson:1999:RIW,
  author =       "Debra Richardson and Paola Inverardi",
  title =        "{ROSATEA: International Workshop on the Role of
                 Software Architecture in Analysis (and) Testing}",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "4",
  pages =        "33--42",
  month =        jul,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/329155.329161",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:46 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This article reports on the International Workshop on
                 the Role of Software Architecture in Analysis and
                 Testing, which was sponsored jointly by U.S. and
                 Italian government agencies. We begin by providing an
                 overview of the workshop organization but focus the
                 technical program. We conclude with the research agenda
                 set forth by the workshop.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Ulrich:1999:IWT,
  author =       "Andreas Ulrich and Gunther Chrobok-Diening",
  title =        "{International Workshop on Testing Distributed
                 Component-Based Systems}",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "4",
  pages =        "43--46",
  month =        jul,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/329155.329162",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:46 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This summary reports on the one-day Workshop on
                 Testing Distributed Component-Based Systems (TDCS) that
                 took place in affiliation with the International
                 Conference on Software Engineering (ICSE) in Los
                 Angeles in May 1999. The workshop dealt with new
                 advances in test methods and test technologies for the
                 emerging class of distributed component-based systems
                 that are built on basis of middleware software like
                 COM, CORBA, or Java RMI, including systems comprising
                 Commercial-Off-The-Shelf (COTS) components. The around
                 thirty workshop attendees discussed what efforts in
                 software technology and research are required to cope
                 with testing such systems. Twelve papers out of
                 nineteen submissions were presented.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Parnas:1999:PPL,
  author =       "David Lorge Parnas",
  title =        "Parnas on Parnas: a life of indecision",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "4",
  pages =        "47--49",
  month =        jul,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/329155.329163",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:46 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Anger:1999:DNS,
  author =       "Frank D. Anger",
  title =        "Directions for the {NSF} software engineering and
                 languages program",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "4",
  pages =        "50--52",
  month =        jul,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/329155.329164",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:46 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "PITAC, IT, and 50 years of history suggest changes in
                 the way we ``do'' software engineering research. NSF's
                 Software Engineering and Languages Program plans new
                 emphases in the coming year that intend to help the
                 field progress.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Anonymous:1999:ICD,
  author =       "Anonymous",
  title =        "{ICSE} '99 conference daily newspaper: Window on the
                 World",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "4",
  pages =        "53--74",
  month =        jul,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/329155.329165",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:46 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Abib:1999:GBT,
  author =       "Janaina C. Abib and Tereza G. Kirner",
  title =        "A {GQM-based} tool to support the development of
                 software quality measurement plans",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "4",
  pages =        "75--80",
  month =        jul,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/329155.329167",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:46 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This paper focuses on the Goal-Question-Metric (GQM)
                 approach, which has been proposed as a goal-oriented
                 approach for the measurement of products and processes
                 in software engineering. First, the GQM is
                 characterized, and then, the GQM-PLAN tool, is
                 described. The GQM-PLAN was developed to support the
                 preparation of measuring plans based on GQM.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Whittaker:1999:WSF,
  author =       "James A. Whittaker and Alan Jorgensen",
  title =        "Why software fails",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "4",
  pages =        "81--83",
  month =        jul,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/329155.329168",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:46 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This note summarizes conclusions from a three year
                 study about why released software fails. Our method was
                 to obtain mature-beta or retail versions of real
                 software applications and stress test them until they
                 fail. From an analysis of the causal faults, we have
                 synthesized four reasons why software fails. This note
                 presents these four classes of failures and discusses
                 the challenges they present to developers and testers.
                 The implications for software testers are emphasized.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Polo:1999:RMP,
  author =       "Macario Polo and Mario Piattini and Francisco Ruiz and
                 Coral Calero",
  title =        "Roles in the maintenance process",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "4",
  pages =        "84--86",
  month =        jul,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/329155.329169",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:46 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Software maintenance is the most expensive and least
                 predictable stage of the software life cycle,
                 representing in some cases between 67\% and 90\% of
                 total costs. On the other hand, it is well known that
                 the structure of a work team influences on the
                 productivity of its members. We can help to decrease
                 costs of maintenance through the definition of an
                 adequate structure of the work team and with the clear
                 identification of the tasks which every member must
                 execute. In this work we expose the results that, in
                 this sense, we have obtained from the application of
                 MANTEMA to real projects. MANTEMA is a methodology for
                 supporting software maintenance, developed jointly by
                 our university and Atos ODS, an international
                 enterprise among whose primary business activities is
                 the outsourcing of software maintenance. Atos ODS is
                 using MANTEMA in big projects of Spanish banking.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Field:1999:IPS,
  author =       "John Field and G. Ramalingam",
  title =        "Identifying procedural structure in {Cobol} programs",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "5",
  pages =        "1--10",
  month =        sep,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/381788.316163",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:47 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The principal control-flow abstraction mechanism in
                 the Cobol language is the perform statement. Normally,
                 perform statements are used in a straightforward manner
                 to define parameterless procedures (where global
                 variables are used to pass data into and out of
                 procedure bodies). However, unlike most procedural
                 constructs, distinct performed procedures can share
                 code in arbitrarily complicated ways. In addition,
                 performs can also be used in such a way as to cause
                 transfers of control that do not correspond to normal
                 call/return semantics. In this paper, we show how a
                 Cobol program can be efficiently transformed into a
                 semantically-equivalent procedurally well-structured
                 representation, in which conventional procedures (i.e.,
                 with the usual call and return semantics and without
                 code sharing) and procedure call statements replace
                 performed code and perform statements. This
                 transformation process properly accounts for the
                 non-procedural control flow that can result from
                 ill-behaved perform statements. The program
                 representation derived from our analysis can be used
                 directly in program understanding applications, program
                 restructuring tools, and inter-language translators. In
                 addition, it can be used as the starting point for a
                 variety of context-sensitive program analyses, e.g.,
                 program slicing.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Agrawal:1999:ECT,
  author =       "Hira Agrawal",
  title =        "Efficient coverage testing using global dominator
                 graphs",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "5",
  pages =        "11--20",
  month =        sep,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/381788.316166",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:47 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Coverage testing techniques, such as statement and
                 decision coverage, play a significant role in improving
                 the quality of software systems. Constructing a
                 thorough set of tests that yield high coverage,
                 however, is often a very tedious, time consuming task.
                 In this paper we present a technique to find a small
                 subset of a program's statements and decisions with the
                 property that covering the subset implies covering the
                 rest. We introduce the notion of a mega block which is
                 a set of basic blocks spanning multiple procedures with
                 the property that one basic block in it is executed iff
                 every basic block in it is executed. We also present an
                 algorithm to construct a data structure called the
                 global dominator graph showing dominator relationships
                 among mega blocks. A tester only needs to create test
                 cases that are aimed at executing one basic block from
                 each of the leaf nodes in this directed acyclic graph.
                 Every other basic block in the program will
                 automatically be covered by the same test set.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Choi:1999:EPM,
  author =       "Jong-Deok Choi and David Grove and Michael Hind and
                 Vivek Sarkar",
  title =        "Efficient and precise modeling of exceptions for the
                 analysis of {Java} programs",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "5",
  pages =        "21--31",
  month =        sep,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/381788.316171",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:47 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The Factored Control Flow Graph, FCFG, is a novel
                 representation of a program's intraprocedural control
                 flow, which is designed to efficiently support the
                 analysis of programs written in languages, such as
                 Java, that have frequently occurring operations whose
                 execution may result in exceptional control flow. The
                 FCFG is more compact than traditional CFG
                 representations for exceptional control flow, yet there
                 is no loss of precision in using the FCFG. In this
                 paper, we introduce the FCFG representation and outline
                 how standard forward and backward data flow analysis
                 algorithms can be adapted to work on this
                 representation. We also present empirical measurements
                 of FCFG sizes for a large number of methods obtained
                 from a variety of Java programs, and compare these
                 sizes with those of a traditional CFG representation.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Whiting:1999:SAH,
  author =       "Liz Whiting and Mike Hill",
  title =        "Safety analysis of {Hawk In Flight} monitor",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "5",
  pages =        "32--38",
  month =        sep,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/381788.316173",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:47 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The development of a military safety critical system
                 has many facets, one of which is the collecting of
                 evidence that can be used to assist the production of
                 the safety case necessary for certification of a system
                 into military use. Within the certification process,
                 static analysis is required by the UK Ministry of
                 Defence to provide evidence of a systems integrity and
                 fitness for purpose. In this paper we describe how we
                 have extended the approach of static analysis to gain
                 evidence of the dynamic integrity of a system. This
                 work, based on the abstract interpretation of variable
                 values into sets of ranges of values, has resulted in
                 the development of a software tool, called the
                 Exception Analyser. This tool can investigate the
                 potential for code, written in C, C++ and Ada, to raise
                 run time exceptions and then derive the system
                 constraints which would prevent these exceptions from
                 occurring. We outline the foundation behind our
                 approach and present the results of a case study into
                 the successful application of the tool on a safety
                 critical military project.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Liang:1999:EAG,
  author =       "Donglin Liang and Mary Jean Harrold",
  title =        "Equivalence analysis: a general technique to improve
                 the efficiency of data-flow analyses in the presence of
                 pointers",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "5",
  pages =        "39--46",
  month =        sep,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/381788.316175",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:47 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Existing methods to handle pointer variables during
                 data-flow analyses can make such analyses inefficient
                 both in time and space because the data-flow analyses
                 must store and propagate large sets of data facts that
                 are introduced by dereferences of pointer variable.
                 This paper presents equivalence analysis, a general
                 technique to improve the efficiency of data-flow
                 analyses in the presence of pointers. The technique
                 identifies equivalence relations among the memory
                 locations accessed by a procedure and ensures that two
                 equivalent memory locations share the same set of data
                 facts in a procedure and in the procedures that are
                 called by that procedure. Thus, a data-flow analysis
                 needs to compute the data-flow information only for a
                 representative memory location in an equivalence class.
                 The data-flow information for other memory locations in
                 the equivalence class can be derived from that of the
                 representative memory location. Our empirical studies
                 indicate that equivalence analysis may effectively
                 improve the efficiency of many data-flow analyses.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Souter:1999:ICD,
  author =       "Amie L. Souter and Lori L. Pollock and Dixie Hisley",
  title =        "Inter-class def-use analysis with partial class
                 representations",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "5",
  pages =        "47--56",
  month =        sep,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/381788.316178",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:47 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Object-oriented program design promotes the reuse of
                 code not only through inheritance and polymorphism, but
                 also through building server classes which can be used
                 by many different client classes. Research on static
                 analysis of object-oriented software has focused on
                 addressing the new features of classes, inheritance,
                 polymorphism, and dynamic binding. This paper
                 demonstrates how exploiting the nature of
                 object-oriented design principles can enable
                 development of scalable static analyses. We present an
                 algorithm for computing def-use information for a
                 single class's manipulation of objects of other
                 classes, which requires that only partial
                 representations of server classes be constructed. This
                 information is useful for data flow testing and
                 debugging.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Naumovich:1999:UPO,
  author =       "Gleb Naumovich and Lori A. Clarke and Jamieson M.
                 Cobleigh",
  title =        "Using partial order techniques to improve performance
                 of data flow analysis based verification",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "5",
  pages =        "57--65",
  month =        sep,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/381788.316180",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:47 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Partial order optimization techniques for distributed
                 systems improve the performance of finite state
                 verification approaches by avoiding redundant
                 exploration of some portions of the state space.
                 Previously, such techniques have been applied in the
                 context of model checking approaches. In this paper we
                 propose a partial order optimization of the program
                 model used by FLAVERS, a data flow based finite state
                 verification approach for checking user-specified
                 properties of distributed software. We demonstrate
                 experimentally that this optimization often leads to
                 significant reductions in the run time of the analysis
                 algorithm of FLAVERS. On average, for those cases where
                 this optimization could be applied, we observed a
                 speedup of 21\%. For one of the cases, the optimization
                 resulted in an analysis speedup of 91\%.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Chandra:1999:PTC,
  author =       "Satish Chandra and Thomas Reps",
  title =        "Physical type checking for {C}",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "5",
  pages =        "66--75",
  month =        sep,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/381788.316183",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:47 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The effectiveness of traditional type checking in C is
                 limited by the presence of type conversions using type
                 casts. Because the C standard allows arbitrary type
                 conversions between pointer types, neither C compilers,
                 nor tools such as lint, can guarantee type safety in
                 the presence of such type conversions. In particular,
                 by using casts involving pointers to structures (C
                 structs), a programmer can interpret any memory region
                 to be of any desired type, further compromising C's
                 weak type system. Not only do type casts make a program
                 vulnerable to type errors, they hinder program
                 comprehension and maintenance by creating latent
                 dependencies between seemingly independent pieces of
                 code. To address these problems, we have developed a
                 stronger form of type checking for C programs, called
                 physical type checking. Physical type checking takes
                 into account the layout of C struct fields in memory.
                 This paper describes an inference-based physical type
                 checking algorithm. Our algorithm can be used to
                 perform static safety checks, as well as compute useful
                 information for software engineering applications.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Preston:1999:NTS,
  author =       "Nicky Williams Preston",
  title =        "New type signatures for legacy {Fortran} subroutines",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "5",
  pages =        "76--85",
  month =        sep,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/381788.316184",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:47 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/fortran3.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "We are currently developing a methodological framework
                 for reverse engineering Fortran77 programs used by
                 Electricit{\'e} de France, in which the first step is
                 the construction of an algebraic specification which
                 faithfully represents the Fortran code. To construct
                 this specification, we must decide on a coherent set of
                 ``profiles'' (type signatures) for the specifications
                 of the Fortran sub-programs. We propose an analysis of
                 the dynamic aliases between formal and actual
                 sub-program arguments in order to derive these
                 profiles. In many examples of real Fortran code this
                 analysis does not give satisfactory results if arrays
                 are treated as indivisible. Instead, we must take into
                 account which fragment of the array may really be
                 accessed by the sub-program. We have therefore
                 implemented our analysis as an extension of the PIPS
                 code parallelisation tool, which provides us with a
                 precise analysis of inter-procedural array data-flow.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Balmas:1999:QON,
  author =       "Fran{\c{c}}oise Balmas",
  title =        "Query by outlines: a new paradigm to help manage
                 programs",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "5",
  pages =        "86--94",
  month =        sep,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/381788.316185",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:47 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "We propose a new paradigm to query information about
                 programs, namely query by outlines. This paradigm
                 relies on an outlining model that conceptually describe
                 units of code according to the computations they
                 perform. Outlines are automatically constructed by our
                 system PRISME for C and Lisp programs. Currently, both
                 our model and our system are restricted to loops.QBO is
                 a prototype tool that implements the query by outline
                 paradigm. It proposes to browse the loops of a program
                 directly through their outline, and allows to restrict
                 these loops to browse with queries expressed as
                 constraints on the outlines. Thus it enables to answer
                 questions such as ``where is this variable modified?'',
                 ``where is this kind of computation performed?'', or
                 ``are there many places where this computation is
                 performed?''. In this paper, we sketch our outlining
                 model, introduce QBO and argue that query by outline is
                 a helpful paradigm to manage programs.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Kokai:1999:GGP,
  author =       "Gabriella K{\'o}kai and J{\"o}rg Nilson and Christian
                 Niss",
  title =        "{GIDTS}: a graphical programming environment for
                 {Prolog}",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "5",
  pages =        "95--104",
  month =        sep,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/381788.316186",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:47 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This paper puts forward the Graphical Interactive
                 Diagnosing, Testing and Slicing System (GIDTS) which is
                 a graphical programming environment for PROLOG
                 programs. The IDTS part of the system integrates
                 Shapiro's Interactive Diagnosis Algorithm with the
                 Category Partition Testing Method (CPM) and a slicing
                 technique performing the algorithmic debugging and
                 functional testing of PROLOG programs. The integration
                 of IDTS with a graphical user interface (GUI) supports
                 the whole functionality of IDTS and provides a
                 user-friendly environment giving the user more
                 information on the state of the debugging process.
                 GIDTS extends IDTS to a complete programming
                 environment. It allows one to handle the debugging of
                 complex programs using the extended syntax and
                 semantics of PROLOG in a very flexible way. A static
                 code diagnosis has also been implemented. In addition
                 GIDTS supports debugging-directed editing of the source
                 program, and a quick source code navigation via any of
                 the tools (for example: the debugger, the static call
                 graph and the information retriever). All these
                 features are supported by the graphical user
                 interface.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Steindl:1999:BDF,
  author =       "Christoph Steindl",
  title =        "Benefits of a data flow-aware programming
                 environment",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "5",
  pages =        "105--109",
  month =        sep,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/381788.316187",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:47 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Many programmers write their programs with a primitive
                 text editor that has no knowledge about the edited
                 text. On the other hand, they use ingenious compilers
                 that collect control flow and data flow information to
                 perform optimizations and generate optimized code. We
                 argue that program editors should have the same
                 knowledge about the control flow and data flow of a
                 program. Such editors could help programmers to better
                 understand programs and to be more productive. We
                 propose a data flow-aware programming environment that
                 makes the information that the compiler already
                 computed visible. The bidirectional feedback from the
                 compiler to the programmer and back from the programmer
                 to the compiler enables productive programming and
                 faster debugging.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Beck:1999:EPD,
  author =       "Kent Beck",
  title =        "Extreme programming: a discipline of software
                 development (invited paper) (abstract only)",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "6",
  pages =        "1",
  month =        nov,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/318774.318778",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:48 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "You can look at software development as a system with
                 inputs and outputs. As with any system, software
                 development needs negative feed-back loops to keep it
                 from oscillating. The negative feedback loops
                 traditionally used --- separate testing groups,
                 documentation, lengthy release cycles, reviews ---
                 succeed at keeping certain aspects under control, but
                 they tend to have only long term benefits. What if we
                 could find a set of negative feedback loops that kept
                 software development under control, but that people
                 wanted to do, even under stress, and that contributed
                 to productivity both short and long term?",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Czarnecki:1999:CGP,
  author =       "Krzysztof Czarnecki and Ulrich W. Eisenecker",
  title =        "Components and generative programming (invited
                 paper)",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "6",
  pages =        "2--19",
  month =        nov,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/318774.318779",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:48 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This paper is about a paradigm shift from the current
                 practice of manually searching for and adapting
                 components and their manual assembly to Generative
                 Programming, which is the automatic selection and
                 assembly of components on demand. First, we argue that
                 the current OO technology does not support reuse and
                 configurability in an effective way. Then we show how a
                 system family approach can aid in defining reusable
                 components. Finally, we describe how automate the
                 assembly of components based on configuration
                 knowledge. We compare this paradigm shift to the
                 introduction of interchangeable parts and automated
                 assembly lines in the automobile industry. We also
                 illustrate the steps necessary to develop a product
                 line using a simple example of a car product line. We
                 present the feature model of the product line, develop
                 a layered architecture for it, and automate the
                 assembly of the components using a generator. We also
                 discuss some design issues, applicability of the
                 approach, and future development.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Hauswirth:1999:CCM,
  author =       "Manfred Hauswirth and Mehdi Jazayeri",
  title =        "A component and communication model for push systems",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "6",
  pages =        "20--38",
  month =        nov,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/318774.318784",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:48 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "We present a communication and component model for
                 push systems. Surprisingly, despite the widespread use
                 of many push services on the Internet, no such models
                 exist. Our communication model contrasts push systems
                 with client-server and event-based systems. Our
                 component model provides a basis for comparison and
                 evaluation of different push systems and their design
                 alternatives. We compare several prominent push systems
                 using our component model. The component model consists
                 of producers and consumers, broadcasters and channels,
                 and a transport system. We detail the concerns of each
                 of these components. Finally, we discuss a number of
                 open issues that challenge the widespread deployment of
                 push or any other system on an Internet-wide scale.
                 Payment models are the most important among these and
                 are not adequately addressed by any existing system. We
                 briefly present the payment approach in our Minstrel
                 project.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Mascolo:1999:FGM,
  author =       "Cecilia Mascolo and Gian Pietro Picco and
                 Gruia-Catalin Roman",
  title =        "A fine-grained model for code mobility",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "6",
  pages =        "39--56",
  month =        nov,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/318774.318785",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:48 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "In this paper we take the extreme view that every line
                 of code is potentially mobile, i.e., may be duplicated
                 and/or moved from one program context to another on the
                 same host or across the network. Our motivation is to
                 gain a better understanding of the range of constructs
                 and issues facing the designer of a mobile code system,
                 in a setting that is abstract and unconstrained by
                 compilation and performance considerations
                 traditionally associated with programming language
                 design. Incidental to our study is an evaluation of the
                 expressive power of Mobile UNITY, a notation and proof
                 logic for mobile computing.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Gafni:1999:RRT,
  author =       "Vered Gafni",
  title =        "Robots: a real-time systems architectural style",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "6",
  pages =        "57--74",
  month =        nov,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/318774.318786",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:48 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "This paper presents an architectural style for
                 real-time systems, and an associated formal
                 architectural description language, called Robots. A
                 basic specification in Robots consists of a synchronous
                 control task that is responsible for the dynamic
                 reconfiguration of the system controller as a set of
                 asynchronous observer and process tasks. The controller
                 architecture evolves by hierarchical refinement of
                 observers and processes into lower level control tasks
                 each dominating a new set of observers and processes.
                 Robots is given operational semantics by statecharts.
                 Also, the architectural style is embedded in Robots by
                 semantic rules that allow formal checking of the
                 consistency and completeness of architectural
                 specifications.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Warboys:1999:CCI,
  author =       "B. C. Warboys and D. Balasubramaniam and R. M.
                 Greenwood and G. N. C. Kirby and K. Mayes and R.
                 Morrison and D. S. Munro",
  title =        "Collaboration and composition: issues for a second
                 generation process language",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "6",
  pages =        "75--90",
  month =        nov,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/318774.318787",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:48 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Over the past decade a variety of process languages
                 have been defined and applied to software engineering
                 environments. The idea of using a process language to
                 encode a software process as a ``process model'', and
                 enacting this using a process-sensitive environment is
                 now well established. Many prototype process-sensitive
                 environments have been developed; but their use in
                 earnest has been limited. We are designing a second
                 generation process language which is a significant
                 departure from current conventional thinking. Firstly a
                 process is viewed as a set of mediated collaborations
                 rather than a set of partially ordered activities.
                 Secondly emphasis is given to how process models are
                 developed, used, and enhanced over a potentially long
                 lifetime. In particular the issue of composing both new
                 and existing model fragments is central to our
                 development approach. This paper outlines these
                 features, and gives the motivations behind them. It
                 also presents a view of process support for software
                 engineering drawing on our decade of experience in
                 exploiting a ``first generation'' process language, and
                 our experience in designing and exploiting programming
                 languages.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Jager:1999:UUS,
  author =       "Dirk J{\"a}ger and Ansgar Schleicher and Bernhard
                 Westfechtel",
  title =        "Using {UML} for software process modeling",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "6",
  pages =        "91--108",
  month =        nov,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/318774.318788",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:48 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Padberg:1999:PMS,
  author =       "Frank Padberg",
  title =        "A probabilistic model for software projects",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "6",
  pages =        "109--126",
  month =        nov,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/318774.318932",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:48 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "A probabilistic model for software development
                 projects is constructed. The model can be applied to
                 compute an estimate for the development time of a
                 project. The chances of succeeding with a given amount
                 of time and the risk of deviating from the estimate can
                 be computed as well. Examples show that the model
                 behaves as expected when the input data are changed.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Leveson:1999:DSL,
  author =       "Nancy G. Leveson and Mats P. E. Heimdahl and Jon Damon
                 Reese",
  title =        "Designing specification languages for process control
                 systems: lessons learned and steps to the future",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "6",
  pages =        "127--145",
  month =        nov,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/318774.318937",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:48 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Previously, we defined a blackbox formal system
                 modeling language called RSML (Requirements State
                 Machine Language). The language was developed over
                 several years while specifying the system requirements
                 for a collision avoidance system for commercial
                 passenger aircraft. During the language development, we
                 received continual feedback and evaluation by FAA
                 employees and industry representatives, which helped us
                 to produce a specification language that is easily
                 learned and used by application experts. Since the
                 completion of the RSML project, we have continued our
                 research on specification languages. This research is
                 part of a larger effort to investigate the more general
                 problem of providing tools to assist in developing
                 embedded systems. Our latest experimental toolset is
                 called SpecTRM (Specification Tools and Requirements
                 Methodology), and the formal specification language is
                 SpecTRM-RL (SpecTRM Requirements Language). This paper
                 describes what we have learned from our use of RSML and
                 how those lessons were applied to the design of
                 SpecTRM-RL. We discuss our goals for SpecTRM-RL and the
                 design features that support each of these goals.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Gargantini:1999:UMC,
  author =       "Angelo Gargantini and Constance Heitmeyer",
  title =        "Using model checking to generate tests from
                 requirements specifications",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "6",
  pages =        "146--162",
  month =        nov,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/318774.318939",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:48 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Recently, many formal methods, such as the SCR
                 (Software Cost Reduction) requirements method, have
                 been proposed for improving the quality of software
                 specifications. Although improved specifications are
                 valuable, the ultimate objective of software
                 development is to produce software that satisfies its
                 requirements. To evaluate the correctness of a software
                 implementation, one can apply black-box testing to
                 determine whether the implementation, given a sequence
                 of system inputs, produces the correct system outputs.
                 This paper describes a specification-based method for
                 constructing a suite of test sequences, where a test
                 sequence is a sequence of inputs and outputs for
                 testing a software implementation. The test sequences
                 are derived from a tabular SCR requirements
                 specification containing diverse data types, i.e.,
                 integer, boolean, and enumerated types. From the
                 functions defined in the SCR specification, the method
                 forms a collection of predicates called branches, which
                 ``cover'' all possible software behaviors described by
                 the specification. Based on these predicates, the
                 method then derives a suite of test sequences by using
                 a model checker's ability to construct counterexamples.
                 The paper presents the results of applying our method
                 to four specifications, including a sizable component
                 of a contractor specification of a real system.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Thompson:1999:SBP,
  author =       "Jeffrey M. Thompson and Mats P. E. Heimdahl and Steven
                 P. Miller",
  title =        "Specification-based prototyping for embedded systems",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "6",
  pages =        "163--179",
  month =        nov,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/318774.318940",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:48 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Specification of software for safety critical,
                 embedded computer systems has been widely addressed in
                 literature. To achieve the high level of confidence in
                 a specification's correctness necessary in many
                 applications, manual inspections, formal verification,
                 and simulation must be used in concert. Researchers
                 have successfully addressed issues in inspection and
                 verification; however, results in the areas of
                 execution and simulation of specifications have not
                 made as large an impact as desired. In this paper we
                 present an approach to specification-based prototyping
                 which addresses this issue. It combines the advantages
                 of rigorous formal specifications and rapid systems
                 prototyping. The approach lets us refine a formal
                 executable model of the system requirements to a
                 detailed model of the software requirements. Throughout
                 this refinement process, the specification is used as a
                 prototype of the proposed software. Thus, we guarantee
                 that the formal specification of the system is always
                 consistent with the observed behavior of the prototype.
                 The approach is supported with the NIMBUS environment,
                 a framework that allows the formal specification to
                 execute while interacting with software models of its
                 embedding environment or even the physical environment
                 itself (hardware-in-the-loop simulation).",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Siff:1999:CTC,
  author =       "Michael Siff and Satish Chandra and Thomas Ball and
                 Krishna Kunchithapadam and Thomas Reps",
  title =        "Coping with type casts in {C}",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "6",
  pages =        "180--198",
  month =        nov,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/318774.318942",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:48 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The use of type casts is pervasive in C. Although
                 casts provide great flexibility in writing programs,
                 their use obscures the meaning of programs, and can
                 present obstacles during maintenance. Casts involving
                 pointers to structures (C structs) are particularly
                 problematic, because by using them, a programmer can
                 interpret any memory region to be of any desired type,
                 thereby compromising C's already weak type system. This
                 paper presents an approach for making sense of such
                 casts, in terms of understanding their purpose and
                 identifying fragile code. We base our approach on the
                 observation that casts are often used to simulate
                 object-oriented language features not supported
                 directly in C. We first describe a variety of ways ---
                 idioms --- in which this is done in C programs. We then
                 develop a notion of physical subtyping, which provides
                 a model that explains these idioms. We have created
                 tools that automatically analyze casts appearing in C
                 programs. Experimental evidence collected by using
                 these tools on a large amount of C code (over a million
                 lines) shows that, of the casts involving struct types,
                 most (over 90\%) can be associated meaningfully --- and
                 automatically --- with physical subtyping. Our results
                 indicate that the idea of physical subtyping is useful
                 in coping with casts and can lead to valuable software
                 productivity tools.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Liang:1999:EPA,
  author =       "Donglin Liang and Mary Jean Harrold",
  title =        "Efficient points-to analysis for whole-program
                 analysis",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "6",
  pages =        "199--215",
  month =        nov,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/318774.318943",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:48 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "To function on programs written in languages such as C
                 that make extensive use of pointers, automated software
                 engineering tools require safe alias information.
                 Existing alias-analysis techniques that are
                 sufficiently efficient for analysis on large software
                 systems may provide alias information that is too
                 imprecise for tools that use it: the imprecision of the
                 alias information may (1) reduce the precision of the
                 information provided by the tools and (2) increase the
                 cost of the tools. This paper presents a
                 flow-insensitive, context-sensitive points-to analysis
                 algorithm that computes alias information that is
                 almost as precise as that computed by Andersen's
                 algorithm --- the most precise flow- and
                 context-insensitive algorithm --- and almost as
                 efficient as Steensgaard's algorithm --- the most
                 efficient flow- and context-insensitive algorithm. Our
                 empirical studies show that our algorithm scales to
                 large programs better than Andersen's algorithm and
                 show that flow-insensitive alias analysis algorithms,
                 such as our algorithm and Andersen's algorithm, can
                 compute alias information that is close in precision to
                 that computed by the more expensive flow- and
                 context-sensitive alias analysis algorithms.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Ball:1999:CDA,
  author =       "Thoms Ball",
  title =        "The concept of dynamic analysis",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "6",
  pages =        "216--234",
  month =        nov,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/318774.318944",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:48 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Dynamic analysis is the analysis of the properties of
                 a running program. In this paper, we explore two new
                 dynamic analyses based on program profiling:Frequency
                 Spectrum Analysis. We show how analyzing the
                 frequencies of program entities in a single execution
                 can help programmers to decompose a program, identify
                 related computations, and find computations related to
                 specific input and output characteristics of a program.
                 Coverage Concept Analysis. Concept analysis of test
                 coverage data computes dynamic analogs to static
                 control flow relationships such as domination,
                 postdomination, and regions. Comparison of these
                 dynamically computed relationships to their static
                 counterparts can point to areas of code requiring more
                 testing and can aid programmers in understanding how a
                 program and its test sets relate to one another.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Rountev:1999:DFA,
  author =       "Atanas Rountev and Barbara G. Ryder and William
                 Landi",
  title =        "Data-flow analysis of program fragments",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "6",
  pages =        "235--252",
  month =        nov,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/318774.318945",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:48 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Traditional interprocedural data-flow analysis is
                 performed on whole programs; however, such
                 whole-program analysis is not feasible for large or
                 incomplete programs. We propose fragment data-flow
                 analysis as an alternative approach which computes
                 data-flow information for a specific program fragment.
                 The analysis is parameterized by the additional
                 information available about the rest of the program. We
                 describe two frameworks for interprocedural
                 flow-sensitive fragment analysis, the relationship
                 between fragment analysis and whole-program analysis,
                 and the requirements ensuring fragment analysis safety
                 and feasibility. We propose an application of fragment
                 analysis as a second analysis phase after an
                 inexpensive flow-insensitive whole-program analysis, in
                 order to obtain better information for important
                 program fragments. We also describe the design of two
                 fragment analyses derived from an already existing
                 whole-program flow- and context-sensitive pointer alias
                 analysis for C programs and present empirical
                 evaluation of their cost and precision. Our experiments
                 show evidence of dramatically better precision
                 obtainable at a practical cost.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Zeller:1999:YMP,
  author =       "Andreas Zeller",
  title =        "Yesterday, my program worked. Today, it does not.
                 Why?",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "6",
  pages =        "253--267",
  month =        nov,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/318774.318946",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:48 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Imagine some program and a number of changes. If none
                 of these changes is applied (``yesterday''), the
                 program works. If all changes are applied (``today''),
                 the program does not work. Which change is responsible
                 for the failure? We present an efficient algorithm that
                 determines the minimal set of failure-inducing changes.
                 Our delta debugging prototype tracked down a single
                 failure-inducing change from 178,000 changed GDB lines
                 within a few hours.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Jaramillo:1999:CCA,
  author =       "Clara Jaramillo and Rajiv Gupta and Mary Lou Soffa",
  title =        "Comparison checking: an approach to avoid debugging of
                 optimized code",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "6",
  pages =        "268--284",
  month =        nov,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/318774.318947",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:48 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "We present a novel approach to avoid the debugging of
                 optimized code through comparison checking. In the
                 technique presented, both the unoptimized and optimized
                 versions of an application program are executed, and
                 computed values are compared to ensure the behaviors of
                 the two versions are the same under the given input. If
                 the values are different, the comparison checker
                 displays where in the application program the
                 differences occurred and what optimizations were
                 involved. The user can utilize this information and a
                 conventional debugger to determine if an error is in
                 the unoptimized code. If the error is in the optimized
                 code, the user can turn off those offending
                 optimizations and leave the other optimizations in
                 place. We implemented our comparison checking scheme,
                 which executes the unoptimized and optimized versions
                 of C programs, and ran experiments that demonstrate the
                 approach is effective and practical.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Chang:1999:SSB,
  author =       "Juei Chang and Debra J. Richardson",
  title =        "Structural specification-based testing: automated
                 support and experimental evaluation",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "6",
  pages =        "285--302",
  month =        nov,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/318774.318948",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:48 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "In this paper, we describe a testing technique, called
                 structural specification-based testing (SST), which
                 utilizes the formal specification of a program unit as
                 the basis for test selection and test coverage
                 measurement. We also describe an automated testing
                 tool, called ADLscope, which supports SST for program
                 units specified in Sun Microsystems' Assertion
                 Definition Language (ADL). ADLscope automatically
                 generates coverage conditions from a program's ADL
                 specification. While the program is tested, ADLscope
                 determines which of these conditions are covered by the
                 tests. An uncovered condition exhibits aspects of the
                 specification inadequately exercised during testing.
                 The tester uses this information to develop new test
                 data to exercise the uncovered conditions. We provide
                 an overview of SST's specification-based test criteria
                 and describe the design and implementation of ADLscope.
                 Specification-based testing is guided by a
                 specification, whereby the testing activity is directly
                 related to what a component under test is supposed to
                 do, rather than what it actually does.
                 Specification-based testing is a significant advance in
                 testing, because it is often more straightforward to
                 accomplish and it can reveal failures that are often
                 missed by traditional code-based testing techniques. As
                 an initial evaluation of the capabilities of
                 specification-based testing, we conducted an experiment
                 to measure defect detection capabilities, code coverage
                 and usability of SST/ADLscope; we report here on the
                 results.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Gyimothy:1999:ERS,
  author =       "Tibor Gyim{\'o}thy and {\'A}rp{\'a}d Besz{\'e}des and
                 Ist{\'a}n Forg{\'a}cs",
  title =        "An efficient relevant slicing method for debugging",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "6",
  pages =        "303--321",
  month =        nov,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/318774.319248",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:48 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Dynamic program slicing methods are widely used for
                 debugging, because many statements can be ignored in
                 the process of localizing a bug. A dynamic program
                 slice with respect to a variable contains only those
                 statements that actually had an influence on this
                 variable. However, during debugging we also need to
                 identify those statements that actually did not affect
                 the variable but could have affected it had they been
                 evaluated differently. A relevant slice includes these
                 potentially affecting statements as well, therefore it
                 is appropriate for debugging. In this paper a forward
                 algorithm is introduced for the computation of relevant
                 slices of programs. The space requirement of this
                 method does not depend on the number of different
                 dynamic slices nor on the size of the execution
                 history, hence it can be applied for real size
                 applications.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Robillard:1999:AEF,
  author =       "Martin P. Robillard and Gail C. Murphy",
  title =        "Analyzing exception flow in {Java} programs",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "6",
  pages =        "322--337",
  month =        nov,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/318774.319251",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:48 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Exception handling mechanisms provided by programming
                 languages are intended to ease the difficulty of
                 developing robust software systems. Using these
                 mechanisms, a software developer can describe the
                 exceptional conditions a module might raise, and the
                 response of the module to exceptional conditions that
                 may occur as it is executing. Creating a robust system
                 from such a localized view requires a developer to
                 reason about the flow of exceptions across modules. The
                 use of unchecked exceptions, and in object-oriented
                 languages, subsumption, makes it difficult for a
                 software developer to perform this reasoning manually.
                 In this paper, we describe a tool called Jex that
                 analyzes the flow of exceptions in Java code to produce
                 views of the exception structure. We demonstrate how
                 Jex can help a developer identify program points where
                 exceptions are caught accidentally, where there is an
                 opportunity to add finer-grained recovery code, and
                 where error-handling policies are not being followed.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Naumovich:1999:EAC,
  author =       "Gleb Naumovich and George S. Avrunin and Lori A.
                 Clarke",
  title =        "An efficient algorithm for computing {MHP} information
                 for concurrent {Java} programs",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "6",
  pages =        "338--354",
  month =        nov,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/318774.319252",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:48 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Information about which statements in a concurrent
                 program may happen in parallel (MHP) has a number of
                 important applications. It can be used in program
                 optimization, debugging, program understanding tools,
                 improving the accuracy of data flow approaches, and
                 detecting synchronization anomalies, such as data
                 races. In this paper we propose a data flow algorithm
                 for computing a conservative estimate of the MHP
                 information for Java programs that has a worst-case
                 time bound that is cubic in the size of the program. We
                 present a preliminary experimental comparison between
                 our algorithm and a reachability analysis algorithm
                 that determines the ``ideal'' static MHP information
                 for concurrent Java programs. This initial experiment
                 indicates that our data flow algorithm precisely
                 computed the ideal MHP information in the vast majority
                 of cases we examined. In the two out of 29 cases where
                 the MHP algorithm turned out to be less than ideally
                 precise, the number of spurious pairs was small
                 compared to the total number of ideal MHP pairs.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Bokowski:1999:CSC,
  author =       "Boris Bokowski",
  title =        "{CoffeeStrainer}: statically-checked constraints on
                 the definition and use of types in {Java}",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "6",
  pages =        "355--374",
  month =        nov,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/318774.319253",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:48 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Usually, programming languages are used according to
                 conventions and rules. Although general rules can be
                 enforced by lint-like tools, there is a large class of
                 rules that cannot be built into such tools because they
                 result from particular design decisions or the reuse of
                 existing software. This paper presents a system, called
                 CoffeeStrainer, that statically checks
                 programmer-specified constraints on Java programs.
                 Unlike previous approaches, which only support
                 constraints that apply to definitions of types,
                 CoffeeStrainer additionally supports a second class of
                 constraints which apply to all uses of a type. Both
                 classes of constraints play an important role for
                 object-oriented class libraries and frameworks, which
                 often make assumptions on their correct use.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Fierz:1999:CMC,
  author =       "Hugo Fierz",
  title =        "The {CIP} method: component- and model-based
                 construction of embedded systems",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "6",
  pages =        "375--392",
  month =        nov,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/318774.319255",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:48 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "CIP is a model-based software development method for
                 embedded systems. The problem of constructing an
                 embedded system is decomposed into a functional and a
                 connection problem. The functional problem is solved by
                 constructing a formal reactive behavioural model. A CIP
                 model consists of concurrent clusters of synchronously
                 cooperating extended state machines. The state machines
                 of a cluster interact by multi-cast events. State
                 machines of different clusters can communicate through
                 asynchronous channels. The construction of CIP models
                 is supported by the CIP Tool, a graphical modelling
                 framework with code generators that transform CIP
                 models into concurrently executable CIP components. The
                 connection problem consists of connecting generated CIP
                 components to the real environment. This problem is
                 solved by means of techniques and tools adapted to the
                 technology of the interface devices. Construction of a
                 CIP model starts from the behaviour of the processes of
                 the real environment, leading to an operational
                 specification of the system behaviour in constructive
                 steps. This approach allows stable interfaces of CIP
                 components to be specified at an early stage, thus
                 supporting concurrent development of their connection
                 to the environment.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Wermelinger:1999:ASA,
  author =       "Michel Wermelinger and Jos{\'e} Luiz Fiadeiro",
  title =        "Algebraic software architecture reconfiguration",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "6",
  pages =        "393--409",
  month =        nov,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/318774.319256",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:48 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The ability of reconfiguring software architectures in
                 order to adapt them to new requirements or a changing
                 environment has been of growing interest, but there is
                 still not much formal work in the area. Most existing
                 approaches deal with run-time changes in a deficient
                 way. The language to express computations is often at a
                 very low level of specification, and the integration of
                 two different formalisms for the computations and
                 reconfigurations require sometimes substantial changes.
                 To address these problems, we propose a uniform
                 algebraic approach with the following characteristics.
                 Components are written in a high-level program design
                 language with the usual notion of state. The approach
                 combines two existing frameworks --- one to specify
                 architectures, the other to rewrite labelled graphs ---
                 just through small additions to either of them. It
                 deals with certain typical problems such as
                 guaranteeing that new components are introduced in the
                 correct state (possibly transferred from the old
                 components they replace). It shows the relationships
                 between reconfigurations and computations while keeping
                 them separate, because the approach provides a
                 semantics to a given architecture through the algebraic
                 construction of an equivalent program, whose
                 computations can be mirrored at the architectural
                 level.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Fradet:1999:CCM,
  author =       "Pascal Fradet and Daniel {Le M{\'e}tayer} and
                 Micha{\"e}l P{\'e}rin",
  title =        "Consistency checking for multiple view software
                 architectures",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "6",
  pages =        "410--428",
  month =        nov,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/318774.319258",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:48 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Consistency is a major issue that must be properly
                 addressed when considering multiple view architectures.
                 In this paper, we provide a formal definition of views
                 expressed graphically using diagrams with
                 multiplicities and propose a simple algorithm to check
                 the consistency of diagrams. We also put forward a
                 simple language of constraints to express more precise
                 (intra-view and inter-view) consistency requirements.
                 We sketch a complete decision procedure to decide
                 whether diagrams satisfy a given constraint expressed
                 in this language. Our framework is illustrated with
                 excerpts of a case study: the specification of the
                 architecture of a train control system.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Jarzabek:1999:SBC,
  author =       "Stan Jarzabek and Peter Knauber",
  title =        "Synergy between component-based and generative
                 approaches",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "6",
  pages =        "429--445",
  month =        nov,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/318774.319260",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:48 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "Building software systems out of pre-fabricated
                 components is a very attractive vision. Distributed
                 Component Platforms (DCP) and their visual development
                 environments bring this vision closer to reality than
                 ever. At the same time, some experiences with component
                 libraries warn us about potential problems that arise
                 in case of software system families or systems that
                 evolve over many years of changes. Indeed,
                 implementation level components, when affected by many
                 independent changes, tend to grow in both size and
                 number, impeding reuse. In this paper, we analyze in
                 detail this effect and propose a program construction
                 environment, based on generative techniques, to help in
                 customization and evolution of component-based systems.
                 This solution allows us to reap benefits of DCPs during
                 runtime and, at the same time, keep components under
                 control during system construction and evolution. In
                 the paper, we describe such a construction environment
                 for component-based systems that we built with a
                 commercial generator and illustrate its features with
                 examples from our domain engineering project. The main
                 lesson learnt from our project is that generative
                 techniques can extend the strengths of the
                 component-based approach in two important ways:
                 Firstly, generative techniques automate routine
                 component customization and composition tasks and allow
                 developers work more productively, at a higher
                 abstraction level. Secondly, as custom components with
                 required properties are generated on demand, we do not
                 need to store and manage multiple versions of
                 components, components do not overly grow in size,
                 helping developers keep the complexity of an evolving
                 system under control.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Bayer:1999:TLA,
  author =       "Joachim Bayer and Jean-Fran{\c{c}}ois Girard and
                 Martin W{\"u}rthner and Jean-Marc DeBaud and Martin
                 Apel",
  title =        "Transitioning legacy assets to a product line
                 architecture",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "6",
  pages =        "446--463",
  month =        nov,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/318774.319262",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:48 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "A successful software system evolves over time, but
                 this evolution often occurs in an ad-hoc fashion. One
                 approach to structure system evolution is the concept
                 of software product lines where a core architecture
                 supports a variety of application contexts. However, in
                 practice, the high cost and high risks of redevelopment
                 as well as the substantial investments made to develop
                 the existing systems most often mandate significant
                 leverage of the legacy assets. Yet, there is little
                 guidance in the literature on how to transition legacy
                 assets into a product line set-up. In this paper, we
                 present RE-PLACE, an approach developed to support the
                 transition of existing software assets towards a
                 product line architecture while taking into account
                 anticipated new system variants. We illustrate this
                 approach with its application in an industrial
                 setting.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Dossick:1999:CMB,
  author =       "Stephen E. Dossick and Gail E. Kaiser",
  title =        "{CHIME}: a metadata-based distributed software
                 development environment",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "6",
  pages =        "464--475",
  month =        nov,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/318774.319264",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:48 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "We introduce CHIME, the Columbia Hypermedia IMmersion
                 Environment, a metadata-based information environment,
                 and describe its potential applications for internet
                 and intranet-based distributed software development.
                 CHIME derives many of its concepts from Multi-User
                 Domains (MUDs), placing users in a semi-automatically
                 generated 3D virtual world representing the software
                 system. Users interact with project artifacts by
                 ``walking around'' the virtual world, where they
                 potentially encounter and collaborate with other users'
                 avatars. CHIME aims to support large software
                 development projects, in which team members are often
                 geographically and temporally dispersed, through novel
                 use of virtual environment technology. We describe the
                 mechanisms through which CHIME worlds are populated
                 with project artifacts, as well as our initial
                 experiments with CHIME and our future goals for the
                 system.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Grimaud:1999:FTI,
  author =       "Gilles Grimaud and Jean-Louis Lanet and Jean-Jacques
                 Vandewalle",
  title =        "{FACADE}: a typed intermediate language dedicated to
                 smart cards",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "6",
  pages =        "476--493",
  month =        nov,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/318774.319265",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:48 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  abstract =     "The use of smart cards to run software modules on
                 demand has become a major business concern for
                 application issuers. Such down-loadable executable
                 content needs to be trusted by the card execution
                 environment in order to ensure that an instruction on a
                 memory area is compliant with the definition of the
                 data stored in this area (i.e. its type). Current
                 solutions for smart cards rely on three techniques. For
                 Java Card, either an off-card verifier-converter
                 performs a static verification of type-safety, or a
                 defensive virtual machine performs the verification at
                 runtime. For other types of open smart cards, no
                 type-checking is carried out and the trust is only
                 based on the containment of applications. Static
                 verification is more efficient and flexible than
                 dynamic techniques. Nevertheless, as the Java verifier
                 cannot fit into a card, the trust is dependent on an
                 external third-party. In this way, the card security
                 has been partly turned to the outside. We propose and
                 describe the FACADE language for which the type-safety
                 verification can be performed statically on-card.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Braberman:1999:VRT,
  author =       "Victor A. Braberman and Miguel Felder",
  title =        "Verification of real-time designs: combining
                 scheduling theory with automatic formal verification",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "6",
  pages =        "494--510",
  month =        nov,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/318774.319266",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:48 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "We present an automatic approach to verify designs of
                 real-time distributed systems for complex timing
                 requirements. We focus our analysis on designs which
                 adhere to the hypothesis of analytical theory for
                 Fixed-Priority scheduling. Unlike previous formal
                 approaches, we draw from that theory and build small
                 formal models (based on Timed Automata) to be analyzed
                 by means of model checking tools. We are thus
                 integrating scheduling analysis into the framework of
                 automatic formal verification.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Giannakopoulou:1999:CPA,
  author =       "Dimitra Giannakopoulou and Jeff Magee and Jeff
                 Kramer",
  title =        "Checking progress with action priority: is it fair?",
  journal =      j-SIGSOFT,
  volume =       "24",
  number =       "6",
  pages =        "511--527",
  month =        nov,
  year =         "1999",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/318774.319268",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:13:48 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib",
  abstract =     "The liveness characteristics of a system are
                 intimately related to the notion of fairness. However,
                 the task of explicitly modelling fairness constraints
                 is complicated in practice. To address this issue, we
                 propose to check LTS (Labelled Transition System)
                 models under a strong fairness assumption, which can be
                 relaxed with the use of action priority. The
                 combination of the two provides a novel and practical
                 way of dealing with fairness. The approach is presented
                 in the context of a class of liveness properties termed
                 progress, for which it yields an efficient
                 model-checking algorithm. Progress properties cover a
                 wide range of interesting properties of systems, while
                 presenting a clear intuitive meaning to users.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}