The primary audit objective was to determine whether the DoD electronic data interchange program complies with year 2000 requirements. The Military Services, the Defense Information Systems Agency, and the Defense Logistics Agency have made generally satisfactory progress in ensuring year 2000 compliance for their electronic data interchange systems. Twenty of 27 electronic data interchange systems identified by the Military Services, the Defense Information Systems Agency, and the Defense...
Topics: DTIC Archive, INSPECTOR GENERAL DEPT OF DEFENSE ARLINGTON VA, *INFORMATION EXCHANGE, *COMPUTER...
The Lincoln Fortran Preprocessor (LFP) was constructed to facilitate structured programming by extending FORTRAN to include the most useful top down control structures. The choice of FORTRAN for a target language was dictated by its being the only higher level language available on many mini-computers. This work was motivated by a desire to make top-down structured programming tools available for the development of FORTRAN software. LFP is an upward compatible extension of FORTRAN which...
Topics: DTIC Archive, Cosgrove, James H, MASSACHUSETTS INST OF TECH LEXINGTON LINCOLN LAB, *COMPUTER...
Symbolic debuggers are program development tools that allow a user to interact with an executing process at the source level. In response to a user query, the debugger must be able to retrieve and display the value of a source variable in a manner consistent with what the user expects with respect to the source statement where execution has halted. However, when a program has been compiled with optimizations, values of variables may either be inaccessible in the run-time state or inconsistent...
Topics: DTIC Archive, Adl-Tabatabai, Ali-Reza, CARNEGIE-MELLON UNIV PITTSBURGH PA DEPT OF COMPUTER SCIENCE,...
This manual provides information on the use and application of the three computer program that comprise the Ammunition Postprocessor (APP) of the Wartime Requirements for Ammunition, Materiel and Personnel (WARRAMP) Methodology. This manual provides a general overview of the Methodology system followed by a user-level discussion of each program. The discussion includes a general description, data base, input and output file samples and sample program runstreams for the applications on the...
Topics: DTIC Archive, Rhoades,Ronald G, CACI INC-FEDERAL ARLINGTON VA, *War games, *Logistics support,...
Debugging complex software systems is a major problem. Proving properties of software systems can be thought of as a debugging tool. If a system S must satisfy property P but we can prove that it does not, then S has bugs in it. On the other hand, if S is proved to satisfy P then this is just a confirmation that a certain aspect of S is correct. We can prove properties of software systems at any stage of development. If we do these proofs early in the design stage, we can prevent errors from...
Topics: DTIC Archive, Vaziri-Farahani, Mandana, CARNEGIE-MELLON UNIV PITTSBURGH PA DEPT OF COMPUTER...
This report presents the results of a study and investigation of software reliability models. In particular, the purpose was to investigate the statistical properties of selected software reliability models, including the statistical properties of the parameter estimates, and to investigate the goodness of fit of the models to actual software error data. The results indicate that the models fit poorly, generally due to in most part the vagaries of the data rather than shortcomings of the models.
Topics: DTIC Archive, Schafer, R E, HUGHES AIRCRAFT CO FULLERTON CA, *COMPUTER PROGRAMS, DATA BASES,...
This paper looks at bugs and errors in the following commonly used statistical packages: SAS, Statistical Package for the Social Sciences (SPSS), Biomedical Data Plan (BMDP), and Minitab. A section on using the Internet to keep up to date on these packages covers subscribing to statistical software lists, searching statistical software lists, using gopher sites of archived messages, and receiving information directly from SAS. A brief section on the literature notes that journals and magazines...
Topics: ERIC Archive, Computer Software, Computer Software Development, Computer Software Evaluation,...
Large-scale distributed virtualized computing infrastructures have become important platforms for many critical real-world systems such as cloud computing, big data processing, and intelligence analysis. However, due to its inherent complexity and sharing nature, virtualized computing infrastructures are inevitably prone to various system anomalies caused by software bugs, hardware failures, and resource contentions. The situation exacerbates if the system is also exposed to malicious attacks....
Topics: DTIC Archive, NORTH CAROLINA STATE UNIV AT RALEIGH, *ANOMALIES, *COMPUTER ARCHITECTURE,...
Two of the most important elements of a computer programming effort are program debugging and documentation. This report provides an outline of fundamental debugging techniques to be used by Project ABACUS programmers. These are proven techniques that have been developed through experience. Documentation guidelines, based on US Army Regulations, have been established in this report to provide the programmers with standards for program documentation. The development of standardized procedures...
Topics: DTIC Archive, Duncan,William L, ARMY TRAINING SUPPORT ACTIVITY FORT GORDON GA COMPUTERIZED TRAINING...
This report is composed of studies that have been conducted to develop the NLS system as an on-line programming environment and to provide an on-line JOVIAL interactive debugger with the capabilities to debug JOVIAL language programs. The final report contains several design additions to the NLS system to create an on-line programming environment. A JOVIAL User's Guide prepared in Addendum Technical Report I provides and extensive set of commands for using the JDAD Debugger. Addendum Technical...
Topics: DTIC Archive, Parsley,Bruce L, SRI INTERNATIONAL MENLO PARK CA, *DEBUGGING(COMPUTERS), COMPUTER...
This report contains the results of a pilot study accomplished to demonstrate the ability to determine the magnitude of software reliability encountered in large-scale computer-based equipment. The engineering model of the Discrete Address Beacon System (DABS) currently undergoing development was used as the subject. Based on software failure and test time data, a software reliability model was developed for the engineering model of DABS and used to measure software reliability and its growth...
Topics: DTIC Archive, EVALUATION ASSOCIATES INC BALA CYNWYD PA, *COMPUTER PROGRAMMING, *MATHEMATICAL...
This report contains the results of a pilot study accomplished to demonstrate the ability to determine the magnitude of software reliability encountered in large-scale computer-based equipment. The engineering model of the Discrete Address Beacon System (DABS) currently undergoing development was used as the subject. Based on software failure and test time data, a software reliability model was developed for the engineering model of DABS and used to measure software reliability and its growth...
Topics: DTIC Archive, EVALUATION ASSOCIATES INC BALA CYNWYD PA, *COMPUTER PROGRAMMING, *MATHEMATICAL...
This report contains the results of a pilot study accomplished to demonstrate the ability to determine the magnitude of software reliability encountered in large-scale computer-based equipment. The engineering model of the Discrete Address Beacon System (DABS) currently undergoing development was used as the subject. Based on software failure and test time data, a software reliability model was developed for the engineering model of DABS and used to measure software reliability and its growth...
Topics: DTIC Archive, EVALUATION ASSOCIATES INC BALA CYNWYD PA, *COMPUTER PROGRAMMING, *MATHEMATICAL...
Algorithm animation is a visualization method used to enhance understanding of functioning of an algorithm or program. Visualization is used for many purposes, including education, algorithm research, performance analysis, and program debugging. This research applies algorithm animation techniques to programs developed for parallel architectures, with specific on the Intel iPSC/2 hypercube. While both P-time and NP-time algorithms can potentially benefit from using visualization techniques, the...
Topics: DTIC Archive, Williams, Edward M, AIR FORCE INST OF TECH WRIGHT-PATTERSON AFB OH SCHOOL OF...
Traditional performance debugging and tuning of parallel programs is based on the 'measure-modify' approach, in which detailed measurements of program executions are used to guide incremental changes to the program that result in better performance. Unfortunately, the performance of a parallel algorithm is often related to its implementation, input data, and machine characteristics in surprising ways, and the measure-modify approach is unsuited to exploring these relationships fully: it is too...
Topics: DTIC Archive, Crovella, Mark E, ROCHESTER UNIV NY DEPT OF COMPUTER SCIENCE, *COMPUTER PROGRAM...
The overall audit objective was to evaluate the status of the U.S. Atlantic Command's progress in resolving the year 2000 computing issues. Our audit focused on the following year 2000 issues: (1) leadership support and awareness, (2) management and resolution strategy, (3) system assessments, (4) prioritization, (5) system interfaces, (6) testing, (7) risk analysis and contingency planning, and (8) support received from responsible Service executive agents.
Topics: DTIC Archive, INSPECTOR GENERAL DEPT OF DEFENSE ARLINGTON VA, *COMPUTER PROGRAM VERIFICATION,...
We present an Array-based Half-Facet mesh data structure, or AHF, for efficient mesh query and modification operations. The AHF extends the compact array-based half-edge and half-face data structures (T.J. Alumbaugh and X. Jiao, Compact array-based mesh data structures, IMR, 2005) to support mixeddimensional and non-manifold meshes. The design goals of our data structure include generality to support such meshes, efficiency of neighborhood queries and mesh modification, compactness of memory...
Topics: DTIC Archive, STATE UNIV OF NEW YORK AT SYRACUSE RESEARCH FOUNDATION, *ARRAYS, *DATA BASES, *MESH,...
A parallel problem solving problem solving system, PRISM (Parallel Inference System), that was implemented on the VAX/11-780, the PYRAMID and SUN machines, was ported successfully to McMOB and then to the BBN Butterfly parallel architecture. The McMOB architecture is essentially the ZMOB architecture with 16 Motorola 68000 processors, upgrading the Z80A microprocessors, interconnected in a ring structure. Experimental testing of PRISM on McMOB was undertaken. In addition, several enhancements...
Topics: DTIC Archive, Minker, Jack, MARYLAND UNIV COLLEGE PARK DEPT OF COMPUTER SCIENCE, *PARALLEL...
This report describes changes in the INTELINK system that have been developed under contract F30602-95-C-0147 and other activities that also took place during that contract period. The period covered is from December 1, 1995 through January 6, 1996. During this period, most of the development effort centered around cleaning up the documentation and source code developed under the contract and planning for future applications. John Gates was hired in the final reporting period to help with...
Topics: DTIC Archive, Spetka, Scott, STATE UNIV OF NEW YORK COLL OF TECHNOLOGY UTICA, *DATA BASES,...
This report consists of the written papers presented at POMIV, the Workshop on Partial Order Methods in Verification held at Princeton July 24-26. POMIV is one of the workshops participating in the DIMACS Special Year in Logic, 1995-1996, and also immediately preceded the Federated Logic Conference (FLoC) held at Rutgers July 27-August 3. The theme of the workshop was the transition from the traditional interleaving model of concurrent computation to the "true noncurrent" model based...
Topics: DTIC Archive, Peled, Doron, RUTGERS - THE STATE UNIV PISCATAWAY NJ, *SOFTWARE ENGINEERING,...
The overall audit objective was to assess whether multi-user, medium sized computers (mid-tier computers) processing Defense Finance and Accounting Service (DFAS) data would operate properly after December 31, 1999. Specifically, we evaluated efforts taken through March 1999 to ensure that mid-tier computer systems and their software were Year 2000 compliant. DFAS managers were aware of and actively involved in achieving compliance with the DoD Year 2000 Management Plan. However, as of March...
Topics: DTIC Archive, INSPECTOR GENERAL DEPT OF DEFENSE ARLINGTON VA, *MICROCOMPUTERS, *COMPUTER PROGRAM...
The overall audit objective was to evaluate whether DLA was adequately planning for and managing year 2000 risks to avoid undue disruption to its supply mission. This audit, the third in a series on the DLA supply mission, focused on the core DLA supply system, SAMMS specifically, we reviewed year 2000 interface agreements, testing plans, contingency plans, and continuity of operations plans. Additional areas of the DoD Year 2000 Management Plan, December 1998, (DoD Management Plan) that we...
Topics: DTIC Archive, INSPECTOR GENERAL DEPT OF DEFENSE ARLINGTON VA, *MANAGEMENT PLANNING AND CONTROL,...
Since the transonic wind tunnel data processing installation, which is based on a PDP 8-I computer, was installed in 1968 a considerable library of standard programs have been produced. This program library covers all types of testing commonly carried out in the wind tunnel. However there remains the possibility of unusual tests being required which are not covered by existing programs. This memorandum describes modifications to the Digital Equipment Corporation FOCAL language (FOCAL is a...
Topics: DTIC Archive, Pollock,N, AERONAUTICAL RESEARCH LABS MELBOURNE (AUSTRALIA), *COMPUTER PROGRAMS,...
This manual documents the use and simple customization of the display editor EMACS with the ITS operating system. The reader is not expected to be a programmer. Even simple customizations do not require programming skill, but the user who is not interested in customizing can ignore the scattered customization hints. This is primarily a reference manual, but can also be used as a primer.
Topics: DTIC Archive, Stallman, Richard M., MASSACHUSETTS INST OF TECH CAMBRIDGE ARTIFICIAL INTELLIGENCE...
This document describes an Incremental Programming Environment (IPE) based on compilation technology, but providing facilities traditionally found only in interpretive systems. IPE provides a comfortable environment for a single programmer working on a single program. In IPE the programmer has a uniform view of the program in terms of the programming language. The program is manipulated through a syntax directed editor and its execution is controlled by a debugging facility, whose actions are...
Topics: DTIC Archive, Feiler,Peter H, CARNEGIE-MELLON UNIV PITTSBURGH PA DEPT OF COMPUTER SCIENCE,...
This document describes an Incremental Programming Environment (IPE) based on compilation technology, but providing facilities traditionally found only in interpretive systems. IPE provides a comfortable environment for a single programmer working on a single program. In IPE the programmer has a uniform view of the program in terms of the programming language. The program is manipulated through a syntax directed editor and its execution is controlled by a debugging facility, whose actions are...
Topics: DTIC Archive, Feiler,Peter H, CARNEGIE-MELLON UNIV PITTSBURGH PA DEPT OF COMPUTER SCIENCE,...
This document describes an Incremental Programming Environment (IPE) based on compilation technology, but providing facilities traditionally found only in interpretive systems. IPE provides a comfortable environment for a single programmer working on a single program. In IPE the programmer has a uniform view of the program in terms of the programming language. The program is manipulated through a syntax directed editor and its execution is controlled by a debugging facility, whose actions are...
Topics: DTIC Archive, Feiler,Peter H, CARNEGIE-MELLON UNIV PITTSBURGH PA DEPT OF COMPUTER SCIENCE,...
Recently there has been an increasing amount of research on the introduction of cryptographic ideas into discrete methods for cryptographic protocol analysis. This is often done by developing a discrete model and a cryptographic model such that the discrete model can be shown sound with respect to the cryptographic model. In this position paper, the author presents a brief outline of a strategy for rendering the analysis of cryptographic protocols by formal methods both sound and tractable. She...
Topics: DTIC Archive, Meadows, Catherine, NAVAL RESEARCH LAB WASHINGTON DC CENTER FOR HIGH ASSURANCE...
Understanding, measuring, and debugging IP networks, particularly across administrative domains, is challenging. Compounding the problem are transparent in-path appliances and middleboxes that can be difficult to manage and sometimes left out-of-date or misconfigured. As a result, packet headers can be modified in unexpected ways, negatively impacting end-to-end performance. We discuss the impact of such packet header modifications, present an array of techniques for their detection, and define...
Topics: DTIC Archive, NAVAL POSTGRADUATE SCHOOL MONTEREY CA, *COMPUTER NETWORKS, DEBUGGING(COMPUTERS),...
The overall audit objective was to evaluate whether year 2000 risks bad been adequately planned for and managed to avoid undue disruption to the U.S. European Command's mission. The specific audit objective was to evaluate the effectiveness of the U.S. European Command year 2000 operational evaluation to test its thin lines of systems critical to performing non-combatant evacuation and peacekeeping operations.
Topics: DTIC Archive, INSPECTOR GENERAL DEPT OF DEFENSE ARLINGTON VA, *COMPUTER PROGRAM VERIFICATION,...
This Note summarizes the commands of the ROSS language. ROSS is an object-oriented programming language currently being developed at Rand. The goal of ROSS is to provide a programming environment in which users can conveniently design, test and change large knowledge-based simulations of complex mechanisms. Object-oriented programming languages, and ROSS in particular, enforce a 'message-passing' style of programming in which the system to be modeled is represented as a set of actors and their...
Topics: DTIC Archive, McArthur,David, RAND CORP SANTA MONICA CA, *PROGRAMMING MANUALS, *ARTIFICIAL...
An algorithm is described for automatically organizing a fairly unstructured expert system rule base in order to facilitate updating and debugging by programmers. The algorithm operates on a structure called an Assertion Cluster Graph (ACG) which consists of nodes for every assertation in the rule base and of arcs connecting the assertations that are dependent on each other for their values. The algorithm reduces the complexity of ACG by replacing related groups of assertions in the graph by a...
Topics: DTIC Archive, Lindell,Suzanne, AEROSPACE CORP EL SEGUNDO CA COMPUTER SCIENCE LAB,...
The primary goal of the National Software Works (NSW) project at UCLA is to make the IBM System/360 and System/370 family of computing systems tool - bearing hosts within the NSW. Previous phases of the project have made the UCLA implementation of the (now obsolete) operating system OS/MVT an NSW tool-bearing host. This phase of the project is to make the current IBM operating system, OS/ MVS, a tool-bearing host. This report is primarily concerned with the conversion of existing software from...
Topics: DTIC Archive, Ludlam, Neil, CALIFORNIA UNIV LOS ANGELES OFFICE OF ACADEMIC COMPUTING, *COMPUTER...
The computer program NPLOT is extended to permit interactive plotting of NASTRAN doublet lattice aerodynamic models. In addition, a translator is developed between Precision Visuals DI-3000 plot package and ISSCO's DISSPLA plot package to permit NPLOT to be run at facilities that support only DISSPLA. The resulting package is useful as a general debugging tool for NASTRAN aerodynamic analysis and as an integral part of nuclear vulnerability model generation programs developed in previous work.
Topics: DTIC Archive, Harris, Steven G, ANAMET LABS INC HAYWARD CA, *AERODYNAMICS, *COMPUTER PROGRAMS,...
The overall goal of this project was to investigate the idea that planning in the presence of uncertain information could be easier, not harder, than planning in its absence. The basic reason proposed was that, since it is impossible to control planning search with precision, uncertain domain information had a potential for use in this area that more accurate information might lack. This suggestion turned out to be correct. During the course of the project, we developed compelling theoretical...
Topics: DTIC Archive, Ginsberg, Matthew L., STANFORD UNIV CA, *ARTIFICIAL INTELLIGENCE,...
Phase 2 Summary: The CNAPS compiler, assembler, application program interface, and Backpropagation Neural Network function library have been ported to the Windows 3.x environment and the CNAPSIPC hardware and integrated with the source-level debugger. The port of the graphical interface for the source-level debugger to Windows 3.x has been completed. These software tools are now in Beta test. Phase 3 Summary: Work has just begun. At the time of this report, the project has been authorized to...
Topics: DTIC Archive, Henry, Wendell A., ADAPTIVE SOLUTIONS BEAVERTON OR, *IMAGE PROCESSING, *PATTERN...
System correctness for real-time systems relies on both functional and temporal correctness of the system components. In order to allow creation and deployment of critical applications with hard real-time constraints in a reactive environment, we have developed the Maruti environment, which consists of the Maruti operating system and runtime environment, and an application development and environment that uses the Maruti Programming Language (MPL), an extension of ANSI C; the Maruti...
Topics: DTIC Archive, Agrawala, Ashok K, MARYLAND UNIV COLLEGE PARK DEPT OF COMPUTER SCIENCE, *DISTRIBUTED...
In May 1974, the American National Standards Institute approved ANS Programming Lnaguage COBOL, X3.23-1974 as the national standard for the COBOL language replacing USA Standard COBOL, X3.23-1968. Federal Information Processing Standards Publication 21-1 adopts X3.23-1974 (minus the Report Writer module) as the Federal COBOL Standard. As a result of these actions, the Federal COBOL Compiler Testing Service is engaged in the development of a new COBOL compiler Validation System, incorporating...
Topics: DTIC Archive, Cook,Margaret M, FEDERAL COBOL COMPILER TESTING SERVICE WASHINGTON D C, *COMPILERS,...
An attempt is made to formulate techniques of program modification, whereby a program that achieves one result can be transformed into a new program that uses the same principles to achieve a different goal. For example, a program that uses the binary search paradigm to calculate the square-root of a number may be modified to divide two numbers in a similar manner, or vice versa. Program debugging is considered as a special case of modification: if a program computes wrong results, it must be...
Topics: DTIC Archive, Dershowitz,Nachum, STANFORD UNIV CALIF DEPT OF COMPUTER SCIENCE, *COMPUTER PROGRAMS,...
This paper presents the weakest preconditions which describe weak correctness, blocking, deadlock, and starvation for nondeterministic programs. A procedure for converting parallel programs to nondeterministic programs is described, and the correctness of various example parallel programs is treated in this manner. Among these are a busy-wait mutual exclusion scheme, and the problem of the Five Dining Philosophers.
Topics: DTIC Archive, Flon,Lawrence, CARNEGIE-MELLON UNIV PITTSBURGH PA DEPT OF COMPUTER SCIENCE, *PARALLEL...
The Lincoln Fortran Preprocessor (LFP) was constructed to facilitate structured programming by extending FORTRAN to include the most useful top down control structures. The choice of FORTRAN for a target language was dictated by its being the only higher level language available on many mini-computers. This work was motivated by a desire to make top-down structured programming tools available for the development of FORTRAN software. LFP is an upward compatible extension of FORTRAN which...
Topics: DTIC Archive, Cosgrove, James H, MASSACHUSETTS INST OF TECH LEXINGTON LINCOLN LAB, *COMPUTER...
This manual provides information on the use and application of the 19 programs that comprise the Materiel Postprocessor (MPP) of the Wartime Requirements for Ammunition, Materiel and Personnel (WARRAMP) methodology. This manual provides a general overview of the methodology system followed by a user-level discussion of each program. The discussion includes a general description, data base, input and output sample program runstream for applications on the UNIVAC 1100/82 installed at the US Army...
Topics: DTIC Archive, Cantlon,Scott, CACI INC-FEDERAL ARLINGTON VA, *War games, *Logistics support,...
The Ada Integrated Environment (AIE) consists of a set of software tools intended to support design, development and maintenance of embedded computer software. A significant portion of an AIE includes software systems and tools residing and executing on a host computer (or set of computers). This set is known as an Ada Programming Support Environment (APSE). This system specification describes the basic design for a minimal APSE, called a MAPSE. The MAPSE is the foundation upon which an APSE is...
Topics: DTIC Archive, INTERMETRICS INC CAMBRIDGE MA, *COMPUTER PROGRAMMING, *HIGH LEVEL LANGUAGES, DATA...
The Ada Integrated Environment (AIE) consists of a set of software tools intended to support design, development and maintenance of embedded computer software. A significant portion of an AIE includes software systems and tools residing and executing on a host computer (or set of computers). This set is known as an Ada Programming Support Environment (APSE). This report describes the rationale of the design for a minimal APSE, called a MAPSE. The MAPSE is the foundation upon which an APSE is...
Topics: DTIC Archive, INTERMETRICS INC CAMBRIDGE MA, *COMPUTER PROGRAMMING, *HIGH LEVEL LANGUAGES, DATA...
The purpose of the Validation Summary Report (VSR) is to identify individual COBOL Language elements whose implementation does not conform to Federal Standard COBOL as adopted from American National Standard Programming Language COBOL, X3.23-1974, by Federal Information Processing Standard 21-1 (FIPS PUB 21-1).
Topics: DTIC Archive, FEDERAL COBOL COMPILER TESTING SERVICE WASHINGTON D C, *COMPUTER PROGRAM...
Work has been completed on development of Bayesian Software Correction Limit Policies designed to determine the optimum time value that minimizes the long run average cost of debugging at two levels - correction action undertaken by the programmer (Phase I) and action undertaken by a system analyst or system designer, if the error is not corrected in Phase I (Phase II). Two models are developed - one assuming the cost of observations of error occurrence and correction time, prior to...
Topics: DTIC Archive, Goel,Amrit L, SYRACUSE UNIV N Y DEPT OF INDUSTRIAL ENGINEERING AND OPERATIONS...
It is profitable to view the process of writing programs as an engineering activity. A program is a deliberately contrived mechanism constructed from parts whose behaviors are combined to produce the behavior of the whole. One proposes to develop a notion of understanding a program which is analogous to similar notions in other engineering subjects. Understanding is a rich notion in engineering domains. It includes the ability to identify the parts of a mechanism and assign a purpose to each...
Topics: DTIC Archive, Rich,Charles, MASSACHUSETTS INST OF TECH CAMBRIDGE ARTIFICIAL INTELLIGENCE LAB,...
The goal of the Multi-Microprocessor Emulation (MMPE) project is to develop modeling and emulation techniques for assemblies of microprocessors. An extension to an existing computer description language (ISPS) is proposed for representing the architecture of multi-microprocessor systems, and the results of some preliminary studies on the design of an emulation facility are described. This effort will eventually lead to a high-speed emulation facility based on the QPRIM system. The emulation...
Topics: DTIC Archive, Hayden, Charles, UNIVERSITY OF SOUTHERN CALIFORNIA MARINA DEL REY INFORMATION...
Software developers often complain that researchers in the field of software engineering propose new ideas without testing these ideas in practical applications. The Architecture Research Facility (ARF) was developed utilizing several software engineering techniques in order to discover their usefulness in actual software system developments. Such techniques as the complete design and documentation of the individual components and interfaces prior to coding; design reviews; code specification...
Topics: DTIC Archive, Elovitz,Honey S, NAVAL RESEARCH LAB WASHINGTON DC, *COMPUTER PROGRAM DOCUMENTATION,...
Topics: DTIC Archive, ARMY ENGINEER WATERWAYS EXPERIMENT STATION VICKSBURG MS, *INTERACTIVE GRAPHICS,...