Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
  • Education.Received the Ph.D. in 1970 from The University of Iowa in the Mathematical Sciences Division with a Dissert... moreedit
Учу8у»»*ят and Software ELSEVIER The Journal of Systems and Software 41 (1998) 17-32 Investments in reusable software. A study of software reuse investment success factors David С Rine a'*, Robert M. Sonnemann b a School of... more
Учу8у»»*ят and Software ELSEVIER The Journal of Systems and Software 41 (1998) 17-32 Investments in reusable software. A study of software reuse investment success factors David С Rine a'*, Robert M. Sonnemann b a School of Information Technology and ...
The paper studies correlations between com-puter security specifications and protection tech-niques in order to find ways by which architec-tural features of a computer system corresponding to security specifications may be designed or... more
The paper studies correlations between com-puter security specifications and protection tech-niques in order to find ways by which architec-tural features of a computer system corresponding to security specifications may be designed or evaluated. The formal basis of the study ...
ABSTRACT A planning capability is one of the important features that autonomous real-time systems must have. Fuzzybased planning is more appropriate for planing in realtime dynamic environments such as vehicle navigation and patient... more
ABSTRACT A planning capability is one of the important features that autonomous real-time systems must have. Fuzzybased planning is more appropriate for planing in realtime dynamic environments such as vehicle navigation and patient monitoring. Planning in such environments needs to be performed as quickly as possible. Planning can be made quicker by reusing portions of similar previous plan segments to efficiently derive a new plan. Planning problems, then, include at least two subproblems. First, the problem of efficiently ...
This in itself has a striking parallel with software engineering, around which there is a large popular mythology as large as that surrounding the Wild West, and just as with the Wild West mythology some worthy principles can be conveyed,... more
This in itself has a striking parallel with software engineering, around which there is a large popular mythology as large as that surrounding the Wild West, and just as with the Wild West mythology some worthy principles can be conveyed, so also many dangerous messages can be ...
ABSTRACT
Page 1. TITLE. "A Survey of MAltiple-Valued Algorithmic Logics: From a Practical Point of View". Author. David Rine Computer Sciences West Virginia University, USA Abstract. This paper on structured flowcharting suggests several... more
Page 1. TITLE. "A Survey of MAltiple-Valued Algorithmic Logics: From a Practical Point of View". Author. David Rine Computer Sciences West Virginia University, USA Abstract. This paper on structured flowcharting suggests several fundamental changes, from a ...
Competency In Computer Instruction In Illinois Public Schools. Very few states have developed certification requirements for public school teachers of digital computing. Therefore it is not surprising that elementary and secondary school... more
Competency In Computer Instruction In Illinois Public Schools. Very few states have developed certification requirements for public school teachers of digital computing. Therefore it is not surprising that elementary and secondary school teachers have received limited computer training. This paper describes a series of workshops to be offered at Western Illinois University during 1979 leading to a “certificate of competency”
ABSTRACT
ABSTRACT
Haya Shida, Subscribe (Full Service), Register (Limited Service, Free), Login. Search: The ACM Digital Library The Guide. ...
Page 1. c o = o 0 Z 0 Z; z Z r~ 0 r~ c~ o ~ • tn ~ • ~.,4 0 -0 0 .0 • C OO 4~ O -IJ E -~ • D~O • 0 4u ~ ~4 ~ ~ o~ ,-~ 0 -,~.o ~ • OlD, ~C O ~-~ ~ O0 ~ -C o ~ -,~ > p .,-~ o 0 o-~ o .I..I c o.~m • mo • • ~ o '13 O~ ~ ~ 0 ~'~ ~... more
Page 1. c o = o 0 Z 0 Z; z Z r~ 0 r~ c~ o ~ • tn ~ • ~.,4 0 -0 0 .0 • C OO 4~ O -IJ E -~ • D~O • 0 4u ~ ~4 ~ ~ o~ ,-~ 0 -,~.o ~ • OlD, ~C O ~-~ ~ O0 ~ -C o ~ -,~ > p .,-~ o 0 o-~ o .I..I c o.~m • mo • • ~ o '13 O~ ~ ~ 0 ~'~ ~ o .,o 1..1~ o~ 01 O~ ~C ~ 0 llZ 0 0 ~ • 04...} • OUl ~ -~ ...
... ture Notes in Mathematics, Springer-Verlag, NewYork, 1966. 16. ... troduction," Harcourt, Brace, and World, New York, 1967. 19. MD Mesarovic, D. Macko, Y. Takahara, "Theory of Hierarchical, Multilevel, Sys... more
... ture Notes in Mathematics, Springer-Verlag, NewYork, 1966. 16. ... troduction," Harcourt, Brace, and World, New York, 1967. 19. MD Mesarovic, D. Macko, Y. Takahara, "Theory of Hierarchical, Multilevel, Sys tem," Academic Press, New York, 1970. 20. ...
“A National Educational TV Series at Pre-College Level for Personal Computing and Computer Literacy”, David C. Rine, Western Illinois University. Under grants from the IEEE Computer Society, The Johns Hopkins University, Radio Shack and... more
“A National Educational TV Series at Pre-College Level for Personal Computing and Computer Literacy”, David C. Rine, Western Illinois University. Under grants from the IEEE Computer Society, The Johns Hopkins University, Radio Shack and other agencies, the International Instructional TV Cooperative, source of instructional TV materials to all educational TV networks nation-wide and internationally, has finished and is marketing the
ABSTRACT
A design pattern is a generic solution to a recurring problem in a given design context [1]. The use of design patterns has many known benefits to the design process. However, since it is the task of a human to instantiate patterns within... more
A design pattern is a generic solution to a recurring problem in a given design context [1]. The use of design patterns has many known benefits to the design process. However, since it is the task of a human to instantiate patterns within designs, it is important to assess whether or not this has been done correctly. This assessment is
Research Interests:
In order to obtain a most effective return on a software project investment, then at least one requirements inspection shall be completed. A formal requirement inspection identifies low quality knowledge representation content in the... more
In order to obtain a most effective return on a software project investment, then at least one requirements inspection shall be completed. A formal requirement inspection identifies low quality knowledge representation content in the requirements document. In software development projects where natural language requirements are produced, a requirements document summarizes the results of requirements knowledge analysis and becomes the basis for subsequent software development. In many cases, the knowledge content quality of the requirements documents dictates the success of the software development. The need for determining knowledge quality of requirements documents is particularly acute when the target applications are large, complicated, and mission critical. The goal of this research is to develop knowledge content quality indicators of requirements statements in a requirements document prior to informal inspections. To achieve the goal, knowledge quality properties of the requirements statements are adopted to represent the quality of requirements statements. A suite of complexity metrics for requirements statements is used as knowledge quality indicators and is developed based upon natural language knowledge research of noun phrase (NP) chunks. A formal requirements inspection identifies low quality knowledge representation content in the requirements document. The knowledge quality of requirements statements of requirements documents is one of the most important assets a project must inspect. An application of the metrics to improve requirements understandability and readability during requirements inspections can be built upon the metrics shown and suggested to be taken into account. Keywords: Requirements Inspections, Chunking and Cognition, Complexity Metrics, Cohesion, Coupling, NP Chunk, Requirements, Software Quality, Information Retrieval, Natural Language Understanding and Processing
Abstract In this paper we present views of stakeholders in the product line approach. We defined a product line model to present and capture these views, and we defined the development process used to capture these views. Furthermore, we... more
Abstract In this paper we present views of stakeholders in the product line approach. We defined a product line model to present and capture these views, and we defined the development process used to capture these views. Furthermore, we present an experimental model for ...
ABSTRACT Software maintenance including design is difficult because it is usually performed on someone else's work over a period of time. Maintaining a pattern‐based design is especially much more difficult when the information on... more
ABSTRACT Software maintenance including design is difficult because it is usually performed on someone else's work over a period of time. Maintaining a pattern‐based design is especially much more difficult when the information on specific patterns that have been used are not available in the corresponding design documents. Also, finding a maintainer who has a similar level of knowledge on specific patterns that the initial designer had is not easy. Pattern‐based design, the use of design patterns during the software design process, has become widely used in the object‐oriented community because of its many benefits such as its reuse. However, the defects in pattern‐based design can be introduced during the design maintenance phase when the changes are made to the requirements and the initial design, but the conformance to the original patterns is neglected. This conformance process is laborious and time consuming; no systematic process exists to guide the defects discovery and maintenance. Also, deep and correct knowledge of design patterns and their characteristics are required because this process is conducted by human experts. Failure to follow this conformance process and to maintain correct designs during software design evolution may cause serious problems in later software development and maintenance stages by not providing the benefits of pattern‐based design that would have been possible if followed correctly. There is a strong need of a systematic design and maintenance method for preventing defects in design patterns introduced during the evolution of pattern‐based software design and its maintenance. Because conventional UML design methods do not provide such systematic ways of assessing pattern‐based design conformance to the evolutionary changes, we have developed the pattern instance changes with UML profiles (PICUP) design method, which is an improved design method for perfective and corrective UML pattern‐based design maintenance and assessment. Design pattern in UML profiles (DPUP) is developed for the use of instantiation, maintenance, and assessment of UML pattern‐based designs to support the formal specification of a design pattern. DPUPs, as the main part of the PICUP design method, provide metamodel‐level UML design constraints using UML stereotype notations and metamodel‐level Object Constraint Language design constraints. Assessment of pattern‐based designs in UML class diagram with the corresponding DPUPs enforces maintainers to make necessary and correct changes to keep the principles of the original designs. Pattern‐related information is annotated using stereotype notations to help assess pattern‐based designs when changes are made. Furthermore, the structural conformance checking of a given UML pattern‐based design can be automated by using the assessment tool. The major contributions of this paper are: (i) specifying design patterns using extended UML profile; (ii) providing a means of how to instantiate pattern‐based designs from DPUPs with naming conventions; and (iii) providing design constraints for maintaining pattern‐based design to guide correct changes of a given design in PICUP method. Explanatory type case studies were performed to better understand and evaluate the effectiveness of the PICUP design method with DPUPs. Answers to the case study questionnaires and the pattern defects discovered from the case studies support the hypothesis that the PICUP method is an improved design method that ensures structural conformance of UML pattern‐based designs to the corresponding design patterns during perfective and corrective design maintenance for software systems. Copyright © 2011 John Wiley & Sons, Ltd.
Numerical issues in the computation of inner-outer factors for a class of retarded delay systems are studied. The plant models considered here are transfer functions which are ratios of two quasi-polynomials. The computation of H optimal... more
Numerical issues in the computation of inner-outer factors for a class of retarded delay systems are studied. The plant models considered here are transfer functions which are ratios of two quasi-polynomials. The computation of H optimal controllers for such plants requires inner-outer factorizations, which is equivalent to finding the right half-plane roots of numerator and denominator quasi-polynomials. Such systems are known to be infinite dimensional, i.e. they have infinitely many poles. An algorithm is developed and implemented for this purpose. H control techniques are employed to find the inner-outer factorization forms for selected system examples.

And 170 more