Last update: Sat Nov 23 12:25:13 MST 2019
Volume SE-4, Number 2, March / April, 1978G. J. Schick and R. W. Wolverton An Analysis of Competing Software Reliability Models . . . . . . . . . . . 104--120
T. F. Gannon and S. D. Shapiro An Optimal Approach to Fault Tolerant Software Systems Design . . . . . . . . 390--409
Anonymous Editor's Notice . . . . . . . . . . . . 1--1 K. L. Heninger Specifying Software Requirements for Complex Systems: New Techniques and Their Application . . . . . . . . . . . 2--13 J. Guttag Notes on Type Abstraction (Version 2) 13--23 D. R. Musser Abstract Data Type Specification in the Affirm System . . . . . . . . . . . . . 24--32 S. K. Basu A Note on Synthesis of Inductive Assertions . . . . . . . . . . . . . . . 32--39 M. Tamir ADI: Automatic Derivation of Invariants 40--48 A. P. Ravn Device Monitors . . . . . . . . . . . . 49--53 H. Takahashi An Automatic-Controller Description Language . . . . . . . . . . . . . . . . 53--64 P. J. Denning Working Sets Past and Present . . . . . 64--84 D. W. Leinbaugh Guaranteed Response Times in a Hard-Real-Time Environment . . . . . . . 85--91 J. Banerjee and D. K. Hsiao and F. K. Ng Database Transformation, Query Translation, and Performance Analysis of a New Database Computer in Supporting Hierarchical Database Management . . . . 91--109 Anonymous Acknowledgment of referees . . . . . . . 110--111 Anonymous Computer Communication Professionals \ldots . . . . . . . . . . . . . . . . . 112--112 Anonymous Call for Papers . . . . . . . . . . . . 112--112 Anonymous Information for authors . . . . . . . . 112--112 Anonymous IEEE copyright form . . . . . . . . . . 112--112 Anonymous Information about the Society . . . . . 112--c-112--c Anonymous IEEE Computer Society Publications . . . 112--e-112--e Anonymous IEEE Computer Society . . . . . . . . . c2--c2 Anonymous \booktitleIEEE Transactions on Software Engineering --- Table of contents . . . c1--c1
Anonymous Guest Editorial . . . . . . . . . . . . 117--117 R. C. Cheung A User-Oriented Software Reliability Model . . . . . . . . . . . . . . . . . 118--125 S. S. Yau and Fu-Chung Chen An Approach to Concurrent Control Flow Checking . . . . . . . . . . . . . . . . 126--137 T. L. Booth and C. A. Wiecek Performance Abstract Data Types as a Tool in Software Performance Analysis and Design . . . . . . . . . . . . . . . 138--151 L. L. Beck A Generalized Implementation Method for Relational Data Sublanguages . . . . . . 152--162 W. E. Howden Functional Program Testing . . . . . . . 162--169 S. K. Basu On Development of Iterative Programs from Function Specifications . . . . . . 170--182 D. L. Russell State Restoration in Systems of Communicating Processes . . . . . . . . 183--194 T. W. Mao and R. T. Yeh Communication Port: A Language Concept for Concurrent Programming . . . . . . . 194--204 Shi-Kuo Chang and Wu-Haung Cheng A Methodology for Structured Database Decomposition . . . . . . . . . . . . . 205--218 P. S. Kritzinger and A. E. Krzesinski and P. Teunissen A Queuing Model of a Time-Sliced Priority-Driven Task Dispatching Algorithm . . . . . . . . . . . . . . . 219--225 Pei Hsia and F. E. Petry A Framework for Discipline in Programming . . . . . . . . . . . . . . 226--232 Anonymous Call for Papers . . . . . . . . . . . . 232--232 Anonymous IEEE Computer Society Publications . . . 232--a-232--a Anonymous IEEE Computer Society . . . . . . . . . c2--c2 Anonymous \booktitleIEEE Transactions on Software Engineering --- Table of contents . . . c1--c1
B. Chandrasekaran Guest Editorial: Special Collection on Program Testing . . . . . . . . . . . . 233--235 E. J. Weyuker and T. J. Ostrand Theories of Program Testing and the Application of Revealing Subdomains . . 236--246 L. J. White and E. I. Cohen A Domain Strategy for Computer Program Testing . . . . . . . . . . . . . . . . 247--257 K. A. Foster Error Sensitive Test Cases Analysis (ESTCA) . . . . . . . . . . . . . . . . 258--264 R. N. Taylor and L. J. Osterweil Anomaly Detection in Concurrent Software by Static Data Flow Analysis . . . . . . 265--278 M. R. Woodward and D. Hedley and M. A. Hennell Experience with Path Analysis and Testing of Programs . . . . . . . . . . 278--286 U. Voges and L. Gmeiner and A. A. Von Mayrhauser SADAT --- an Automated Testing Tool . . 286--290 F. N. Parr An Alternative to the Rayleigh Curve Model for Software Development Effort 291--296 D. B. Lomet Subsystems of Processes with Deadlock Avoidance . . . . . . . . . . . . . . . 297--304 B. Walke and W. Rosenbohm Deadline-Oriented Servicing: Waiting-Time Distributions . . . . . . . 304--312 Anonymous Call for Papers . . . . . . . . . . . . 312--312 Anonymous IEEE Computer Society Publications . . . 312--a-312--a Anonymous IEEE Computer Society . . . . . . . . . c2--c2 Anonymous \booktitleIEEE Transactions on Software Engineering --- Table of contents . . . c1--c1
C. N. Fischer and R. J. LeBlanc The Implementation of Run-Time Diagnostics in Pascal . . . . . . . . . 313--319 A. Celentano and P. D. Vigna and C. Ghezzi and D. Mandrioli Separate Compilation and Partial Specification in Pascal . . . . . . . . 320--328 M. A. Hennell and J. A. Prudom A Static Analysis of the NAG Library . . 329--333 K. R. Tavernier and P. H. Notredame Macro-Based Cross Assemblers . . . . . . 334--340 T. Y. Young and P. S. Liu Overhead Storage Considerations and a Multilinear Method for Data File Compression . . . . . . . . . . . . . . 340--347 A. Reuter A Fast Transaction-Oriented Logging Scheme for Undo Recovery . . . . . . . . 348--356 W. T. Hardgrave Ambiguity in Processing Boolean Queries on TDMS Tree Structures: A Study of Four Different Philosophies . . . . . . . . . 357--372 J. Labetoulle and G. Pujolle Isolation Method in a Network of Queues 373--381 P. S. Kritzinger and A. E. Krzesinski and P. Teunissen Incorporating System Overhead in Queuing Network Models . . . . . . . . . . . . . 381--390 J. E. Allchin Modula and a Question of Time . . . . . 390--391 A. C. Davies The Analogy Between Electrical Networks and Flowcharts . . . . . . . . . . . . . 391--394 P. Bourret and P. Cros Presentation and Correction of Errors in Operating System Measurements . . . . . 395--398 Anonymous CompCon 80 Fall . . . . . . . . . . . . 398--398 Anonymous Information about the Society . . . . . 398--a-398--b Anonymous IEEE Computer Society Publications . . . 398--c-398--c Anonymous IEEE Computer Society . . . . . . . . . c2--c2 Anonymous \booktitleIEEE Transactions on Software Engineering --- Table of contents . . . c1--c1
Anonymous Editor's Notice . . . . . . . . . . . . 401--401 Y. M. Babad and J. A. Hoffer Data Element Security and Its Effects on File Segmentation . . . . . . . . . . . 402--410 E. Gudes The Design of a Cryptography Based Secure File System . . . . . . . . . . . 411--420 L. J. Mekly and S. S. Yau Software Design Representation Using Abstract Process Networks . . . . . . . 420--435 V. D. Gligor and S. H. Shattuck On Deadlock Detection in Distributed Systems . . . . . . . . . . . . . . . . 435--440 C. V. Ramamoorthy and G. S. Ho Performance Evaluation of Asynchronous Concurrent Systems Using Petri Nets . . 440--449 A. D. Birrell and R. M. Needham A Universal File Server . . . . . . . . 450--453 V. R. Basili and R. E. Noonan A Comparison of the Axiomatic and Functional Models of Structured Programming . . . . . . . . . . . . . . 454--465 J. C. King Program correctness: on inductive assertion methods . . . . . . . . . . . 465--479 J. C. Huang A New Verification Rule and Its Applications . . . . . . . . . . . . . . 480--484 W. H. Leung and C. V. Ramamoorthy An Approach to Formal Specification of Control Modules . . . . . . . . . . . . 485--489 B. Littlewood Theories of Software Reliability: How Good Are They and How Can They Be Improved? . . . . . . . . . . . . . . . 489--500 A. L. Goel A Summary of the Discussion on ``An Analysis of Competing Software Reliability Models'' . . . . . . . . . . 501--502 Anonymous Advance Announcing \ldots Tutorial Week80 . . . . . . . . . . . . . . . . . 502--502 Anonymous Call for Papers . . . . . . . . . . . . 502--502 Anonymous Call for Papers . . . . . . . . . . . . 502--502 Anonymous IEEE Computer Society Publications . . . 502--c-502--c Anonymous IEEE Computer Society . . . . . . . . . c2--c2 Anonymous \booktitleIEEE Transactions on Software Engineering --- Table of contents . . . c1--c1
Anonymous Guest Editorial . . . . . . . . . . . . 505--505 A. L. Baker and S. H. Zweben A Comparison of Measures of Control Flow Complexity . . . . . . . . . . . . . . . 506--512 R. N. Faiman and A. A. Koretesoja An Optimizing Pascal Compiler . . . . . 512--519 Ning-San Chang and King-Sun Fu Query-by-Pictorial-Example . . . . . . . 519--524 T. Murata Synthesis of Decision-Free Concurrent Systems for Prescribed Resources and Performance . . . . . . . . . . . . . . 525--530 Kuo-Chung Tai Program Testing Complexity and Test Criteria . . . . . . . . . . . . . . . . 531--538 K. Voss Using Predicate/Transition-Nets to Model and Analyze Distributed Database Systems 539--544 S. S. Yau and J. S. Collofello Some Stability Measures for Software Maintenance . . . . . . . . . . . . . . 545--552 R. F. Brender Generation of Blisses . . . . . . . . . 553--563 R. P. Cook *MOD --- a Language for Distributed Programming . . . . . . . . . . . . . . 563--571 J. L. Bentley and M. Shaw An Alphard Specification of a Correct and Efficient Transformation on Data Structures . . . . . . . . . . . . . . . 572--584 D. J. Taylor and D. E. Morgan and J. P. Black Redundancy in Data Structures: Improving Software Fault Tolerance . . . . . . . . 585--594 D. J. Taylor and D. E. Morgan and J. P. Black Redundancy in Data Structures: Some Theoretical Results . . . . . . . . . . 595--602 H. F. Ledgard and J. A. Whiteside and W. Seymour and A. Singer An Experiment on Human Engineering of Interactive Software . . . . . . . . . . 602--604 Anonymous Advance Announcement \ldots Tutorial Week80 . . . . . . . . . . . . . . . . . 604--604 Anonymous Call for Papers . . . . . . . . . . . . 604--604 Anonymous Call for Papers . . . . . . . . . . . . 604--604 Anonymous 1980 Index \booktitleIEEE Transactions on Software Engineering Vol. SE-6 . . . 604--604 Anonymous Information about the Society . . . . . 604--h-604--h Anonymous IEEE Computer Society Publications . . . 604--i-604--i Anonymous IEEE Computer Society . . . . . . . . . c2--c2 Anonymous \booktitleIEEE Transactions on Software Engineering --- Table of contents . . . c1--c1
Anonymous Editorial: Program Transformations . . . 1--2 R. Balzer Transformational Implementation: An Example . . . . . . . . . . . . . . . . 3--14 M. Broy and P. Pepper Program Development as a Formal Activity 14--22 E. Deak A Transformational Derivation of a Parsing Algorithm in a High-Level Language . . . . . . . . . . . . . . . . 23--31 D. S. Wile Type Transformations . . . . . . . . . . 32--39 J. Arthur and J. Ramanathan Design of Analyzers for Selective Program Analysis . . . . . . . . . . . . 39--51 K. L. Clark and M. H. Van Emden Consequence Verification of Flowcharts 52--60 L. H. Holley and B. K. Rosen Qualified Data Flow Problems . . . . . . 60--78 E. G. Coffman and E. Gelenbe and B. Plateau Optimization of the Number of Copies in a Distributed Data Base . . . . . . . . 78--84 P. A. Ng Further Analysis of the Entity-Relationship Approach to Database Design . . . . . . . . . . . . . . . . . 85--99 S. Al-Fedaghi and P. Scheuermann Mapping Considerations in the Design of Schemas for the Relational Model . . . . 99--111 B. Srinivasan and R. Sankar Algorithms to Distribute a Database for Parallel Searching . . . . . . . . . . . 112--112 R. L. Budzinski and E. S. Davidson and W. Mayeda and H. S. Stone DMIN: An Algorithm for Computing the Optimal Dynamic Allocation in a Virtual Memory Computer . . . . . . . . . . . . 113--121 R. L. Budzinski and E. S. Davidson A Comparison of Dynamic and Static Virtual Memory Allocation Algorithms . . 122--131 P. Sipala Optimum Cell Size for the Storage of Messages . . . . . . . . . . . . . . . . 132--134 A. J. Smith Internal Scheduling and Memory Contention . . . . . . . . . . . . . . . 135--146 J. W. Duran and J. J. Wiorkowski Capture-Recapture Sampling for Estimating Software Error Content . . . 147--148 Anonymous 1980 Referees List . . . . . . . . . . . 148--149 Anonymous Information for authors . . . . . . . . 150--150 Anonymous Call for Papers . . . . . . . . . . . . 151--151 Anonymous IEEE copyright form . . . . . . . . . . 151--151 Anonymous 5th International Conference on Software Engineering . . . . . . . . . . . . . . 151--151 Anonymous IEEE Computer Society Publications . . . 151--j-151--j Anonymous IEEE Computer Society . . . . . . . . . c2--c2 Anonymous \booktitleIEEE Transactions on Software Engineering --- Table of contents . . . c1--c1
Anonymous Editor's Notice . . . . . . . . . . . . 161--161 R. L. Glass Persistent Software Errors . . . . . . . 162--168 D. Comer Principles of Program Design Induced from Experience with Small Public Programs . . . . . . . . . . . . . . . . 169--174 B. Lint and T. Agerwala Communication Issues in the Design and Analysis of Parallel Algorithms . . . . 174--188 D. Coleman and J. W. Hughes and M. S. Powell A Method for the Syntax Directed Design of Multiprograms . . . . . . . . . . . . 189--196 H. A. Ellozy The Determination of Loop Invariants for Programs with Arrays . . . . . . . . . . 197--206 N. Dershowitz and Z. Manna Inference Rules for Program Annotation 207--222 E. M. Reingold and J. S. Tilford Tidier Drawings of Trees . . . . . . . . 223--228 P. Reisner Formal Grammar and Human Factors Design of an Interactive Graphics System . . . 229--240 R. Sanford and J. Gibson Simplifld Alfu-N2merik FOnetiks (Sanf) 241--248 T. Chusho and T. Hayashi Performance Analyses of Paging Algorithms for Compilation of a Highly Modularized Program . . . . . . . . . . 248--254 G. C. Goldbogen PRIM: A Fast Matrix Transpose Method . . 255--257 Anonymous Announcement & Call for Papers . . . . . 257--257 Anonymous Call for Papers . . . . . . . . . . . . 257--257 Anonymous IEEE Computer Society Publications . . . 257--d-257--d Anonymous IEEE Computer Society Press . . . . . . 257--a-257--b Anonymous IEEE Computer Society . . . . . . . . . c2--c2 Anonymous \booktitleIEEE Transactions on Software Engineering --- Table of contents . . . c1--c1
P. Y. R. Ma and T. G. Lewis On the Design of a Microcode Compiler for a Machine-Independent High-Level Language . . . . . . . . . . . . . . . . 261--274 C. Wetherell and A. Shannon LR --- Automatic Parser Generator and LR(1) Parser . . . . . . . . . . . . . . 274--278 G. K. Papakonstantinou An Interpreter of Attribute Grammars and Its Application to Waveform Analysis . . 279--283 Jo-Mei Chang and King-Sun Fu Extended K-d Tree Database Organization: A Dynamic Multiattribute Clustering Method . . . . . . . . . . . . . . . . . 284--290 R. M. Bryant On Homogeneity and On-Line--Off-Line Behavior in M/G/1 Queueing Systems . . . 291--299 V. R. Basili and R. W. Reiter A Controlled Experiment Quantitatively Comparing Software Development Approaches . . . . . . . . . . . . . . . 299--320 A. Brandwajn and J. A. Hernandez A Study of a Mechanism for Controlling Multiprogrammed Memory in an Interactive System . . . . . . . . . . . . . . . . . 321--331 Anonymous Call for Papers . . . . . . . . . . . . 332--332 Anonymous 8th International Colloquium on Automata, Languages and Programming (ICALP 81) . . . . . . . . . . . . . . . 332--332 Anonymous IEEE Computer Society Publications . . . 332--a-332--a Anonymous IEEE Computer Society . . . . . . . . . c2--c2 Anonymous \booktitleIEEE Transactions on Software Engineering --- Table of contents . . . c1--c1
R. H. Thayer and A. B. Pyster and R. C. Wood Major Issues in Software Engineering Project Management . . . . . . . . . . . 333--342 D. E. Peercy A Software Maintainability Evaluation Methodology . . . . . . . . . . . . . . 343--351 Anonymous Editor's Note . . . . . . . . . . . . . 352--352 A. Singer and H. Ledgard and J. F. Hueras The Annotated Assistant: A Step Towards Human Engineering . . . . . . . . . . . 353--373 T. Robers Global Comments . . . . . . . . . . . . 370--370 B. Shneiderman Comments from a Letter Written on July 19, 1978 . . . . . . . . . . . . . . . . 370--371 A. Singer and H. Ledgard and J. F. Hueras Author's reply . . . . . . . . . . . . . 373--374 G. Jomier A Mathematical Model for the Comparison of Static and Dynamic Memory Allocation in a Paged System . . . . . . . . . . . 375--385 L. M. Ni and Kai Hwang Performance Modeling of Shared-Resource Array Processors . . . . . . . . . . . . 386--394 H. G. Perros A Symmetrical Exponential Open Queue Network with Blocking and Feedback . . . 395--402 A. J. Smith Analysis of Long Term File Reference Patterns for Application to File Migration Algorithms . . . . . . . . . . 403--417 J. Misra and K. M. Chandy Proofs of Networks of Processes . . . . 417--426 S. S. Yau and Chen-Chau Yang and S. M. Shatz An Approach to Distributed Computing System Software Design . . . . . . . . . 427--436 S. K. Shrivastava Structuring Distributed Systems for Recoverability and Crash Resistance . . 436--447 P. R. Eggert Runtime Checking for ISO Standard Pascal 447--448 Anonymous Call for Papers . . . . . . . . . . . . 448--448 Anonymous IEEE Computer Society Publications . . . 448--a-448--a Anonymous IEEE Computer Society . . . . . . . . . c2--c2 Anonymous \booktitleIEEE Transactions on Software Engineering --- Table of contents . . . c1--c1
D. R. Barstow and H. E. Shrobe Guest Editorial: Programming Environments . . . . . . . . . . . . . . 449--450 J. W. Goodwin Why Programming Environments Need Dynamic Data Types . . . . . . . . . . . 451--457 E. Kant and D. R. Barstow The Refinement Paradigm: The Interaction of Coding and Efficiency Knowledge in Program Synthesis . . . . . . . . . . . 458--471 R. Medina-Mora and P. H. Feiler An Incremental Programming Environment 472--482 B. W. Boehm An Experiment in Small-Scale Application Software Engineering . . . . . . . . . . 482--493 V. H. Haase Real-Time Behavior of Programs . . . . . 494--501 J. L. W. Kessels The Soma: A Programming Construct for Distributed Processing . . . . . . . . . 502--509 S. Henry and D. Kafura Software Structure Metrics Based on Information Flow . . . . . . . . . . . . 510--518 A. J. Blikle On the Development of Correct Specified Programs . . . . . . . . . . . . . . . . 519--527 Anonymous Advance Announcement \ldots Tutorial Week West81 . . . . . . . . . . . . . . 527--527 Anonymous Call for Papers . . . . . . . . . . . . 527--527 Anonymous IEEE Computer Society Publications . . . 527--b-527--b Anonymous IEEE Computer Society . . . . . . . . . c2--c2 Anonymous \booktitleIEEE Transactions on Software Engineering --- Table of contents . . . c1--c1
Anonymous Editor's Notice . . . . . . . . . . . . 529--529 Anonymous Guest Editorial . . . . . . . . . . . . 530--530 S. W. Smoliar Operational Requirements Accommodation in Distributed System Design . . . . . . 531--537 C. V. Ramamoorthy and Y. R. Mok and F. B. Bastani and G. H. Chin and K. Suzuki Application of a Methodology for the Development and Validation of Reliable Process Control Software . . . . . . . . 537--555 S. S. Yau and P. C. Grabow A Model for Representing Programs Using Hierarchical Graphs . . . . . . . . . . 556--574 K. P. Eswaran and V. C. Hamacher and G. S. Shedler Collision-Free Access Control for Computer Communication Bus Networks . . 574--582 S. H. Bokhari A Shortest Tree Algorithm for Optimal Assignments Across Space and Time in a Distributed Processor System . . . . . . 583--589 R. L. Baber A Method for Representing Data Items of Unlimited Length in a Computer Memory 590--593 A. L. Mennie and G. H. Macewen Information Flow Certification Using an Intermediate Code Program Representation 594--607 P. A. Lee and J. L. Lloyd and S. K. Shrivastava Some Critical Comments on the Paper ``An Optimal Approach to Fault Tolerant Software Systems Design'' by Gannon and Shapiro . . . . . . . . . . . . . . . . 608--610 T. F. Gannon and S. D. Shapiro Comments on the Critique of Lee, Lloyd, and Shrivastava . . . . . . . . . . . . 610--611 Anonymous Advance Announcement \ldots Tutorial Week East82 . . . . . . . . . . . . . . 611--611 Anonymous 1981 Index \booktitleIEEE Transactions on Software Engineering Vol. SE-7 . . . 611--611 Anonymous IEEE Computer Society Publications . . . 611--f-611--f Anonymous IEEE Computer Society . . . . . . . . . c2--c2 Anonymous \booktitleIEEE Transactions on Software Engineering --- Table of contents . . . c1--c1
R. C. Waters The Programmer's Apprentice: Knowledge Based Program Editing . . . . . . . . . 1--12 A. Moitra Direct Implementation of Algebraic Specification of Abstract Data Types . . 12--20 J. Schwarz Using Annotations to Make Recursion Equations Behave . . . . . . . . . . . . 21--33 R. L. Probert Optimal Insertion of Software Probes in Well-Delimited Programs . . . . . . . . 34--42 R. B. Dannenberg and G. W. Ernst Formal Program Verification Using Symbolic Execution . . . . . . . . . . . 43--52 A. Ephremides and O. A. Mowafi Analysis of a Hybrid Access Scheme for Buffered Users-Probabilistic Time Division . . . . . . . . . . . . . . . . 52--61 P. B. Hawthorn and D. J. DeWitt Performance Analysis of Alternative Database Machine Architectures . . . . . 61--75 A. K. Agrawala and S. K. Tripathi and G. Ricart Adaptive Routing Using a Virtual Waiting Time Technique . . . . . . . . . . . . . 76--81 Anonymous Information for authors . . . . . . . . 82--82 Anonymous Advance Announcement \ldots Tutorial Week East 82 . . . . . . . . . . . . . . 83--83 Anonymous Call for Papers . . . . . . . . . . . . 83--83 Anonymous IEEE copyright form . . . . . . . . . . 83--83 Anonymous Students in Computer Science and Engineering! . . . . . . . . . . . . . . 83--83 Anonymous IEEE Computer Society Publications . . . 83--f-83--f Anonymous IEEE Computer Society . . . . . . . . . c2--c2 Anonymous \booktitleIEEE Transactions on Software Engineering --- Table of contents . . . c1--c1
J. P. Kearns and C. J. Meier and M. L. Soffa The Performance Evaluation of Control Implementations . . . . . . . . . . . . 89--96 W. A. Abu-Sufah and D. A. Padua Some Results on the Working Set Anomalies in Numerical Programs . . . . 97--106 H. Samet Code Optimization Considerations in List Processing Systems . . . . . . . . . . . 107--112 G. Harrus and B. Plateau Queueing Analysis of a Reordering Issue 113--123 A. J. Baroody and D. J. DeWitt The Impact of Run-Time Schema Interpretation in a Network Data Model DBMS . . . . . . . . . . . . . . . . . . 123--136 L. A. Rowe and K. P. Birman A Local Network Based on the UNIX Operating System . . . . . . . . . . . . 137--146 K. S. Shankar A Functional Approach to Module Verification . . . . . . . . . . . . . . 147--160 Anonymous Advance Announcement \ldots Tutorial Week East82 . . . . . . . . . . . . . . 160--160 Anonymous Call for Papers . . . . . . . . . . . . 160--160 Anonymous Call for Participation . . . . . . . . . 160--160 M. Ossefort Corrigendum to ``Proofs of Networks of Processes'' . . . . . . . . . . . . . . 160--160 Anonymous Announcing an Important New Journal \booktitleIEEE Transactions on Medical Imaging . . . . . . . . . . . . . . . . 160--a-160--a Anonymous IEEE Computer Society Publications . . . 160--e-160--e Anonymous IEEE Computer Society Press Checklist of New Titles December 1981 . . . . . . . . 160--d-160--d Anonymous IEEE Computer Society . . . . . . . . . c2--c2 Anonymous \booktitleIEEE Transactions on Software Engineering --- Table of contents . . . c1--c1
B. Bhargava Guest Editorial: Reliability Issues in Distributed Systems . . . . . . . . . . 165--167 D. R. Ries and G. C. Smith Nested Transactions in Distributed Systems . . . . . . . . . . . . . . . . 167--172 T. Minoura and G. Wiederhold Resilient Extended True-Copy Token Scheme for a Distributed Database System 173--189 K. H. Kim Approaches to Mechanization of the Conversation Scheme Based on Monitors 189--197 M. J. Fischer and N. D. Griffeth and N. A. Lynch Global States of a Distributed System 198--202 B. Liskov On Linguistic Support for Distributed Programs . . . . . . . . . . . . . . . . 203--210 Yat-Sang Kwong and D. Wood A New Method for Concurrency in B-Trees 211--222 G. Ozsoyoglu and F. Y. Chin Enhancing the Security of Statistical Databases with a Question-Answering System and a Kernel Design . . . . . . . 223--234 C. C. Chang and R. C. T. Lee and M. W. Du Symbolic Gray Code as a Perfect Multiattribute Hashing Scheme for Partial Match Queries . . . . . . . . . 235--249 P. Zave An Operational Approach to Requirements Specification for Embedded Systems . . . 250--269 V. R. Basili and H. D. Mills Understanding and Documenting Programs 270--283 J. L. Reuss Macro Implementation of a Structured Assembly Language . . . . . . . . . . . 284--287 N. Francez and M. Rodeh Achieving Distributed Termination without Freezing . . . . . . . . . . . . 287--292 Anonymous 1981 Referees List . . . . . . . . . . . 293--294 Anonymous Announcing The 3rd International Conference on Distributed Computing Systems . . . . . . . . . . . . . . . . 294--294 Anonymous Call for Papers . . . . . . . . . . . . 294--294 Anonymous IEEE Computer Society Press Checklist of New Titles . . . . . . . . . . . . . . . 294--b-294--b Anonymous IEEE Computer Society Publications . . . 294--c-294--c Anonymous IEEE Computer Society . . . . . . . . . c2--c2 Anonymous \booktitleIEEE Transactions on Software Engineering --- Table of contents . . . c1--c1
Anonymous Editorial . . . . . . . . . . . . . . . 297--297 S. Balsamo and G. Iazeolla An Extension of Norton's Theorem for Queueing Networks . . . . . . . . . . . 298--305 J. A. Stankovic Good System Structure Features: Their Complexity and Execution Time Cost . . . 306--318 L. J. Siegel and H. J. Siegel and P. H. Swain Performance Measures for Evaluating Algorithms for SIMD Machines . . . . . . 319--331 M. Maekawa and Y. Morimoto Performance Adjustment of an APL Interpreter . . . . . . . . . . . . . . 331--343 F. Bazzichi and I. Spadafora An Automatic Generator for Compiler Testing . . . . . . . . . . . . . . . . 343--353 C. V. Ramamoorthy and F. B. Bastani Software Reliability --- Status and Perspectives . . . . . . . . . . . . . . 354--371 W. E. Howden Weak Mutation Testing and Completeness of Test Sets . . . . . . . . . . . . . . 371--379 L. A. Clarke and J. Hassell and D. J. Richardson A Close Look at Domain Testing . . . . . 380--390 E. J. H. Chang Echo Algorithms: Depth Parallel Operations on General Graphs . . . . . . 391--401 T. C. K. Chou and J. A. Abraham Load Balancing in Distributed Systems 401--412 T. C. Wesselkamper Computer Program Schemata and the Processes They Generate . . . . . . . . 412--419 M. Dubois and F. A. Briggs Performance of Synchronized Iterative Processes in Multiprocessor Systems . . 419--431 F. L. Vermeulen On the Combined Problem of Compaction and Sorting . . . . . . . . . . . . . . 432--435 J. Kontos and G. K. Papakonstantinou The Interpretation of Meta Grammars Describing Syntax-Directed Interpreters Using an Attribute Grammar Interpreter 435--436 M. Lipow Number of Faults per Line of Code . . . 437--439 G. Gardarin and M. Melkanoff Proving Consistency of Database Transactions Written in Extended Pascal 440--446 Anonymous 6th International Conference on Software Engineering . . . . . . . . . . . . . . 446--446 Anonymous The Second Software Engineering Standards Applications Workshop Call for Papers . . . . . . . . . . . . . . . . . 446--446 G. H. MacEwen Correction to ``Information Flow Certification Using an Intermediate Code Program Representation'' . . . . . . . . 446--446 Anonymous IEEE Computer Society Publications . . . 446--c-446--c Anonymous IEEE Computer Society . . . . . . . . . c2--c2 Anonymous \booktitleIEEE Transactions on Software Engineering --- Table of contents . . . c1--c1
B. G. Claybrook A Specification Method for Specifying Data and Procedural Abstractions . . . . 449--459 C. A. Sunshine and D. H. Thompson and R. W. Erickson and S. L. Gerhart and D. Schwabe Specification and Verification of Communication Protocols in AFFIRM Using State Transition Models . . . . . . . . 460--489 M. S. Feather Program Specification Applied to a Text Formatter . . . . . . . . . . . . . . . 490--498 N. C. Shu and V. Y. Lum and F. C. Tung and C. L. Chang Specification of Forms Processing and Business Procedures for Office Automation . . . . . . . . . . . . . . . 499--512 J. L. Gieser On Horizontally Microprogrammed Microarchitecture Description Techniques 513--525 J. Archer and R. Conway Display Condensation of Program Text . . 526--529 S. Kundu On a Class of Linear Maps for Data Compression . . . . . . . . . . . . . . 530--532 Anonymous Advance Announcement \ldots Tutorial Week West82 . . . . . . . . . . . . . . 532--532 Anonymous IEEE Computer Society Publications . . . 532--a-532--a Anonymous IEEE Computer Society . . . . . . . . . c2--c2 Anonymous \booktitleIEEE Transactions on Software Engineering --- Table of contents . . . c1--c1
H. Boral and D. J. Dewitt and D. Friedland and N. F. Jarrell and W. K. Wilkinson Implementation of the Database Machine DIRECT . . . . . . . . . . . . . . . . . 533--543 S. B. Yao and V. E. Waddle and B. C. Housel View Modeling and Integration Using the Functional Data Model . . . . . . . . . 544--553 G. S. Ho and C. V. Ramamoorthy Protocols for Deadlock Detection in Distributed Database Systems . . . . . . 554--557 A. Silberschatz and Z. M. Kedam A Family of Locking Protocols for Database Systems that Are Modeled by Directed Graphs . . . . . . . . . . . . 558--562 N. Roussopoulos The Logical Access Path Schema of a Database . . . . . . . . . . . . . . . . 563--573 F. Y. Chin and G. Ozsoyoglu Auditing and Inference Control in Statistical Databases . . . . . . . . . 574--582 Yang-Chang Hong and S. Y. W. Su A Mechanism for Database Protection in Cellular-Logic Devices . . . . . . . . . 583--596 A. Lockman and N. Minsky Unidirectional Transport of Rights and Take--Grant Control . . . . . . . . . . 597--604 N. H. Gehani Databases and Units of Measure . . . . . 605--611 H. Mendelson Analysis of Extendible Hashing . . . . . 611--619 R. N. Horspool and E. C. R. Hehner Comments on ``A Method for Representing Data Items of Unlimited Length in a Computer Memory'' . . . . . . . . . . . 620--621 Anonymous Advance Announcement \ldots Tutorial Week West82 . . . . . . . . . . . . . . 621--621 Anonymous Call for Papers . . . . . . . . . . . . 621--621 Anonymous Call for Papers 1983 Trends and Applications Conference . . . . . . . . 621--621 Anonymous 1982 Index \booktitleIEEE Transactions on Software Engineering Vol. SE-18 . . . 621--621 R. L. Baber Author's reply . . . . . . . . . . . . . 621--621 Anonymous IEEE Computer Society Publications . . . 621--h-621--h Anonymous IEEE Computer Society . . . . . . . . . c2--c2 Anonymous \booktitleIEEE Transactions on Software Engineering --- Table of contents . . . c1--c1
R. Snodgrass An Object-Oriented Command Language . . 1--8 R. P. Cook and T. J. Leblanc A Symbol Table Abstraction to Implement Languages with Explicit Scope Control 8--12 D. A. Lamb and P. N. Hilfinger Simulation of Procedure Variables Using Ada Tasks . . . . . . . . . . . . . . . 13--15 P. Ancilotti and M. Boari and N. Lijtmaer Language Features for Access Control . . 16--25 J. Aoe and Y. Yamamoto and R. Shimada A Practical Method for Reducing Weak Precedence Parsers . . . . . . . . . . . 25--30 L. A. Rowe and K. A. Shoens Programming Language Constructs for Screen Definition . . . . . . . . . . . 31--39 B. E. Jacobs and C. A. Walczak A Generalized Query-by-Example Data Manipulation Language Based on Database Logic . . . . . . . . . . . . . . . . . 40--57 P. M. G. Apers and A. R. Hevner and S. B. Yao Optimization Algorithms for Distributed Queries . . . . . . . . . . . . . . . . 57--68 E. J. Lau and D. Ferrari Program Restructuring in a Multilevel Virtual Memory . . . . . . . . . . . . . 69--79 T. Nishigaki Experiments on the Knee Criterion in a Multiprogrammed Computer System . . . . 79--86 C. H. C. Leung Analysis of Secondary Storage Fragmentation . . . . . . . . . . . . . 87--93 C. A. Coutant and R. E. Griswold and D. R. Hanson Measuring the Performance and Behavior of Icon Programs . . . . . . . . . . . . 93--103 R. R. Oldehoeft Program Graphs and Execution Behavior 103--108 R. A. Marie and J. M. Pellaumail Steady-State Probabilities for a Queue with a General Service Distribution and State-Dependent Arrivals . . . . . . . . 109--113 C. A. Sunshine and D. H. Thompson and R. W. Erickson and S. L. Gerhart and D. Schwabe Correction to ``Specification and Verification of Communication Protocols in AFFIRM Using State Transition Models'' . . . . . . . . . . . . . . . . 113--113 Anonymous Information for authors . . . . . . . . 114--114 Anonymous Call for Papers . . . . . . . . . . . . 115--115 Anonymous IEEE copyright form . . . . . . . . . . 115--115 Anonymous IEEE Computer Society Publications . . . 115--b-115--b Anonymous IEEE Computer Society . . . . . . . . . c2--c2 Anonymous \booktitleIEEE Transactions on Software Engineering --- Table of contents . . . c1--c1
Anonymous Editorial . . . . . . . . . . . . . . . 117--117 J. D. Musa Guest Editorial: COMPSAC '81 Special Section . . . . . . . . . . . . . . . . 118--119 L. F. Rubin Syntax-Directed Pretty Printing --- a First Step Towards a Syntax-Directed Editor . . . . . . . . . . . . . . . . . 119--127 J. P. Kearns and S. DeFazio Locality of Reference in Hierarchical Database Systems . . . . . . . . . . . . 128--134 M. Y. L. Ip and L. V. Saxton and V. V. Raghavan On the Selection of an Optimal Set of Indexes . . . . . . . . . . . . . . . . 135--143 Duen-Ping Tsay and M. T. Liu MIKE: A Network Operating System for the Distributed Double-Loop Computer Network 143--154 V. Y. Shen and S. D. Conte and H. E. Dunsmore Software Science Revisited: A Critical Analysis of the Theory and Its Empirical Support . . . . . . . . . . . . . . . . 155--165 N. S. Coulter Software Science and Cognitive Psychology . . . . . . . . . . . . . . . 166--171 R. M. Negrini and M. Sami Some Properties Derived from Structural Analysis of Program Graph Models . . . . 172--178 S. L. Getz and G. Kalligiannis and S. R. Schach A Very High-Level Interactive Graphical Trace for the Pascal Heap . . . . . . . 179--185 P. Schulthess and C. Jacobi Anatomy of a Small Pascal Compiler . . . 185--191 S. T. Redwine An Engineering Approach to Software Test Data Design . . . . . . . . . . . . . . 191--200 J. R. Menand and M. Becker Modeling a Multiprocessor Architecture 201--210 V. Hayward and A. Osorio A System to Automatically Analyze Assembled Programs . . . . . . . . . . . 210--213 Anonymous Call for Papers . . . . . . . . . . . . 213--213 Anonymous Database Engineering . . . . . . . . . . 213--213 Anonymous IEEE Computer Society Publications . . . 213--d-213--d Anonymous Nominations Invited for IEEE Awards . . 213--b-213--c Anonymous IEEE Computer Society . . . . . . . . . c2--c2 Anonymous \booktitleIEEE Transactions on Software Engineering --- Table of contents . . . c1--c1
Anonymous Editorial . . . . . . . . . . . . . . . 217--217 Anonymous State-of-the-Art Issues in Distributed Databases . . . . . . . . . . . . . . . 218--218 D. Skeen and M. Stonebraker A Formal Model of Crash Recovery in a Distributed System . . . . . . . . . . . 219--228 E. Wong Dynamic Rematerialization: Processing Distributed Queries Using Redundant Data 228--232 P. A. Bernstein and N. Goodman and Ming-Yee Lai Analyzing Concurrency Control Algorithms When User and System Operations Differ 233--239 D. S. Parker and G. J. Popek and G. Rudisin and A. Stoughton and B. J. Walker and E. Walton and J. M. Chow and D. Edwards and S. Kiser and C. Kline Detection of Mutual Inconsistency in Distributed Systems . . . . . . . . . . 240--247 J. Van Den Bos and M. J. Plasmeijer and P. H. Hartel Input--Output Tools: A Language Facility for Interactive and Real-Time Systems 247--259 L. Logrippo and D. R. Skuce File Structures, Program Structures, and Attributed Grammars . . . . . . . . . . 260--266 N. S. Prywes and A. Pnueli Compilation of Nonprocedural Specifications into Computer Programs 267--279 F. G. Pagan A Diagrammatic Notation for Abstract Syntax and Abstract Structured Objects 280--289 G. H. MacEwen The Design for a Secure System Based on Program Analysis . . . . . . . . . . . . 289--299 D. Ferrari and Yiu-yoo Yih VSWS: The Variable-Interval Sampled Working Set Policy . . . . . . . . . . . 299--305 M. W. Du and T. M. Hsieh and K. F. Jea and D. W. Shieh The Study of a New Perfect Hash Scheme 305--313 M. K. Sinha Nonsensitive Data and Approximate Transactions . . . . . . . . . . . . . . 314--322 H. S. Koch and P. Kubat Optimal Release Time of Computer Software . . . . . . . . . . . . . . . . 323--327 P. R. McMullin and J. D. Gannon Combining Testing with Formal Specifications: A Case Study . . . . . . 328--335 S. J. Zeil Testing for Perturbations of Program Statements . . . . . . . . . . . . . . . 335--346 J. W. Laski and B. Korel A Data Flow Oriented Program Testing Strategy . . . . . . . . . . . . . . . . 347--354 T. Anderson and J. C. Knight A Framework for Software Fault Tolerance in Real-Time Systems . . . . . . . . . . 355--364 R. L. Kashyap and B. J. Oommen The Noisy Substring Matching Problem . . 365--370 J. R. Jagannathan and R. Vasudevan Comments on ``Protocols for Deadlock Detection in Distributed Database Systems'' . . . . . . . . . . . . . . . 371--371 Anonymous Call for Papers . . . . . . . . . . . . 372--372 Anonymous 1982 Referees List . . . . . . . . . . . 372--372 Anonymous IEEE Computer Society Publications . . . 372--a-372--a Anonymous IEEE Computer Society . . . . . . . . . c2--c2 Anonymous \booktitleIEEE Transactions on Software Engineering --- Table of contents . . . c1--c1
I. T. Hawryszkiewycz A Semantic Design Method . . . . . . . . 373--384 E. D. Carlson and J. R. Rhyne and D. L. Weller Software Structure for Display Management Systems . . . . . . . . . . . 385--394 J. R. White On the Multiple Implementation of Abstract Data Types Within a Computation 395--411 I. V. Ramakrishnan and J. C. Browne A Paradigm for the Design of Parallel Algorithms with Applications . . . . . . 411--415 W. E. Kluge and H. Schlutter Petri Net Models for the Evaluation of Applicative Programs Based on $ \lambda $-Expressions . . . . . . . . . . . . . 415--427 J. Ludewig ESPRESO --- a System for Process Control Software Specification . . . . . . . . . 427--436 S. Jajodia and J. Liu and P. A. Ng A Scheme of Parallel Processing for MIMD Systems . . . . . . . . . . . . . . . . 436--445 P. Wegner and S. A. Smolka Processes, Tasks, and Monitors: A Comparative Study of Concurrent Programming Primitives . . . . . . . . . 446--462 G. Bernard Interconnection of Local Computer Networks: Modeling and Optimization Problems . . . . . . . . . . . . . . . . 463--470 B. Bhargava and C. T. Hua A Causal Model for Analyzing Distributed Concurrency Control Algorithms . . . . . 470--486 S. Ceri and S. Navathe and G. Wiederhold Distribution Design of Logical Database Schemas . . . . . . . . . . . . . . . . 487--504 To-Yat Cheung Graph Traversal Techniques and the Maximum Flow Problem in Distributed Computation . . . . . . . . . . . . . . 504--512 L. N. Bhuyan and D. P. Agarval Performance Analysis of FFT Algorithms on Multiprocessor Systems . . . . . . . 512--521 R. L. Larsen and A. K. Agrawala Control of a Heterogeneous Two-Server Exponential Queueing System . . . . . . 522--526 A. Silberschatz Extending CSP to Allow Dynamic Resource Management . . . . . . . . . . . . . . . 527--531 M. J. Ferguson Weighted Processor Sharing-Results for Hyperexponential Servers . . . . . . . . 531--535 A. Silberschatz A Case for Non-Two-Phase Locking Protocols that Ensure Atomicity . . . . 535--538 Anonymous Advance Announcement \ldots Tutorial Week West83 . . . . . . . . . . . . . . 538--538 Anonymous Advance Program . . . . . . . . . . . . 538--538 Anonymous Call for Papers . . . . . . . . . . . . 538--538 Anonymous IEEE Computer Society Publications . . . 538--c-538--c Anonymous IEEE Computer Society . . . . . . . . . c2--c2 Anonymous \booktitleIEEE Transactions on Software Engineering --- Table of contents . . . c1--c1
L. L. Beck and T. E. Perkins A Survey of Software Engineering Practice: Tools, Methods, and Results 541--561 R. D. H. Warburton Managing and Predicting the Costs of Real-Time Software . . . . . . . . . . . 562--569 N. G. Leveson and P. R. Harvey Analyzing Software Safety . . . . . . . 569--579 C. L. Heitmeyer and J. D. McLean Abstract requirements specification: A new approach and its application . . . . 580--589 R. A. Nelson and L. M. Haibt and P. B. Sheridan Casting Petri Nets into Programs . . . . 590--602 J. E. Coolahan and N. Roussopoulos Timing Requirements for Time-Driven Systems Using Augmented Petri Nets . . . 603--616 S. Jajodia and P. A. Ng and F. N. Springsteel The Problem of Equivalence for Entity-Relationship Diagrams . . . . . . 617--630 I. Kalantari and G. McDonald A Data Structure and an Algorithm for the Nearest Point Problem . . . . . . . 631--634 Anonymous Advance Announcement \ldots Tutorial Week West83 . . . . . . . . . . . . . . 634--634 Anonymous Advance Program Summary Software Maintenance Workshop . . . . . . . . . . 634--634 Anonymous Call for Papers . . . . . . . . . . . . 634--634 Anonymous IEEE Computer Society Publications . . . 634--c-634--c Anonymous IEEE Computer Society . . . . . . . . . c2--c2 Anonymous \booktitleIEEE Transactions on Software Engineering --- Table of contents . . . c1--c1
B. Curtis Software Metrics: Guest Editor's Introduction . . . . . . . . . . . . . . 637--638 A. J. Albrecht and J. E. Gaffney Software Function, Source Lines of Code, and Development Effort Prediction: A Software Science Validation . . . . . . 639--648 C. A. Behrens Measuring the Productivity of Computer Systems Development Activities with Function Points . . . . . . . . . . . . 648--652 V. R. Basili and R. W. Selby and T. Phillips Metric Analysis and Data Validation Across Fortran Projects . . . . . . . . 652--663 V. R. Basili and D. H. Hutchens An Empirical Study of a Syntactic Complexity Family . . . . . . . . . . . 664--672 L. J. Osterweil Toolpack --- an Experimental Software Development Environment Research Project 673--685 J. S. Gourlay A Mathematical Framework for the Investigation of Testing . . . . . . . . 686--709 Bo-Shoe Chen and R. T. Yeh Formal Specification and Verification of Distributed Systems . . . . . . . . . . 710--722 K. Ramamritham and R. M. Keller Specification of Synchronizing Processes 722--733 S. S. Yau and M. U. Caglayan Distributed Software System Design Representation Using Modified Petri Nets 733--745 M. Trachtenberg Order and Difficulty of Debugging . . . 746--747 Anonymous Advance Announcement Tutorial Week East84 . . . . . . . . . . . . . . . . . 747--747 Anonymous Call for Papers Small Computer (R)Evolution . . . . . . . . . . . . . . 747--747 Anonymous 1983 Index \booktitleIEEE Transactions on Software Engineering Vol. SE-9 . . . 747--747 Anonymous Join Us in the Quest for Technical Excellence . . . . . . . . . . . . . . . 747--747 Anonymous Preliminary Announcement . . . . . . . . 747--747 Anonymous IEEE Computer Society Publications . . . 747--n-747--n Anonymous IEEE Computer Society . . . . . . . . . c2--c2 Anonymous \booktitleIEEE Transactions on Software Engineering --- Table of contents . . . c1--c1
Anonymous Editorial . . . . . . . . . . . . . . . 1--1 Anonymous Guest Editorial: Software Engineering Project Management . . . . . . . . . . . 2--3 B. W. Boehm Software Engineering Economics . . . . . 4--21 J. Cooper Software Development Management Planning 22--26 N. R. Howes Managing Software Development Projects for Maximum Productivity . . . . . . . . 27--35 F. J. Buckley and R. Poston Software Quality Assurance . . . . . . . 36--41 J. P. McGill The Software Engineering Shortage: A Third Choice . . . . . . . . . . . . . . 42--49 W. Scacchi Managing Software Engineering Projects: A Social Analysis . . . . . . . . . . . 49--59 W. Bryan and S. Siegel Making Software Visible, Operational, and Maintainable in a Small Project Environment . . . . . . . . . . . . . . 59--67 G. M. Weinberg and D. P. Freedman Reviews, Walkthroughs, and Inspections 68--72 M. Branstad and P. B. Powell Software Engineering Project Standards 73--78 E. H. Bersoff Elements of Software Configuration Management . . . . . . . . . . . . . . . 79--87 C. C. Chang and M. W. Du and R. C. T. Lee Performance Analyses of Cartesian Product Files and Random Files . . . . . 88--99 F. B. Bastani Performance Improvement of Abstractions Through Context Dependent Transformations . . . . . . . . . . . . 100--116 J. Aoe and Y. Yamamoto and R. Shimada A Method for Improving String Pattern Matching Machines . . . . . . . . . . . 116--120 Anonymous IEEE copyright form . . . . . . . . . . 121--122 Anonymous Information for authors . . . . . . . . 123--123 Anonymous Advance Announcement . . . . . . . . . . 124--124 Anonymous [Breaker page] . . . . . . . . . . . . . nil1--nil1 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous [Front cover] . . . . . . . . . . . . . c2--c2 Anonymous IEEE Computer Society . . . . . . . . . nil1--nil1
Anonymous Editorial . . . . . . . . . . . . . . . 125--125 Anonymous Foreword . . . . . . . . . . . . . . . . 126--127 C. Morgan and B. Sufrin Specification of the UNIX Filing System 128--142 I. D. Cottam The Rigorous Development of a System Version Control Program . . . . . . . . 143--154 F. W. Beichter and O. Herzog and H. Petzsch SLAN-4 --- a software specification and design language . . . . . . . . . . . . 155--162 F. Cristian Correct and Robust Programs . . . . . . 163--174 W. M. Turski On Programming by Iterations . . . . . . 175--178 A. Silberschatz Cell: A Distributed Computing Modularization Concept . . . . . . . . . 178--185 M. L. Wu and T. Y. Hwang Access Control with Single-Key-Lock . . 185--191 R. H. Katz and T. J. Lehman Database Support for Versions and Alternatives of Large Design Files . . . 191--200 S. Christodoulakis and C. Faloutsos Design Considerations for a Message File Server . . . . . . . . . . . . . . . . . 201--210 H. Garcia-Molina and F. Germano and W. H. Kohler Debugging a Distributed Computing System 210--219 Anonymous Call for Papers . . . . . . . . . . . . 220--220 Anonymous [Front cover] . . . . . . . . . . . . . c2--c2 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous Table of contents . . . . . . . . . . . nil1--nil1
R. J. Le Blanc and C. N. Fischer A Simple Separate Compilation Mechanism for Block-Structured Languages . . . . . 221--227 M. S. McKendry and R. H. Campbell Implementing Language Support in High-Level Languages . . . . . . . . . . 227--236 M. J. Ferguson Multiaccess in a Nonqueueing Mailbox Environment . . . . . . . . . . . . . . 237--243 A. E. Oldehoeft and S. F. Jennings Dataflow Resource Managers and Their Synthesis from Open Path Expressions . . 244--257 L. Svobodova Resilient Distributed Computing . . . . 257--268 C. Abbott Intervention Schedules for Real-Time Programming . . . . . . . . . . . . . . 268--274 D. D. Dunlop and V. R. Basili A Heuristic for Deriving Loop Functions 275--285 N. C. K. Phillips Safe Data Type Specifications . . . . . 285--289 B. W. Boehm and T. E. Gray and T. Seewaldt Prototyping Versus Specifying: A Multiproject Experiment . . . . . . . . 290--303 D. L. Weller and B. W. York A Relational Representation of an Abstract Type System . . . . . . . . . . 303--309 D. L. Spooner and E. Gudes A Unifying Approach to the Design of a Secure Database Operating System . . . . 310--319 V. D. Gligor A Note on Denial-of-Service in Operating Systems . . . . . . . . . . . . . . . . 320--324 Anonymous [Front cover] . . . . . . . . . . . . . c2--c2 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous Table of contents . . . . . . . . . . . nil1--nil1
S. S. Lam and A. U. Shankar Protocol Verification via Projections 325--342 N. H. Gehani Broadcasting Sequential Processes (BSP) 343--351 M. Weiser Program Slicing . . . . . . . . . . . . 352--357 A. Reuter and H. Kinzinger Automatic Design of the Internal Schema for a CODASYL Database System . . . . . 358--375 W. K. Wiener-Ehrlich and J. R. Hamrick and V. F. Rupolo Modeling Software Behavior in Terms of a Formal Life Cycle Curve: Implications for Software Maintenance . . . . . . . . 376--383 H. G. Stuebing A Software Engineering Environment (SEE) for Weapon System Software . . . . . . . 384--397 I. Vessey and R. Weber Research on Structured Programming: An Empiricist's Evaluation . . . . . . . . 397--407 T. C. Snow Use of Software Engineering Practices at a Small MIS Shop . . . . . . . . . . . . 408--413 W. J. Stewart and W. P. Stohs Some Equivalence Results for Load-Independent Exponential Queueing Networks . . . . . . . . . . . . . . . . 414--422 T. O. Alanko and H. H. A. Erkio and I. J. Haikala Virtual Memory Behavior of Some Sorting Algorithms . . . . . . . . . . . . . . . 422--431 J. Jachner and V. K. Agarwal Data Flow Anomaly Detection . . . . . . 432--437 J. W. Duran and S. C. Ntafos An Evaluation of Random Testing . . . . 438--444 C. H. C. Leung and Q. H. Choo On the Execution of Large Batch Programs in Unreliable Computing Systems . . . . 444--450 R. F. Sarraga Static Data Flow Analysis of PL/I Programs with the PROBE System . . . . . 451--459 J. E. Gaffney Estimating the Number of Faults in Code 459--464 G. D. Lakhanai and J. S. Wang Comments on ``Optimization Algorithms for Distributed Queries'' . . . . . . . 464--465 W. Perrizo A Method for Processing Distributed Database Queries . . . . . . . . . . . . 466--471 Anonymous Call for Papers . . . . . . . . . . . . 472--472 Anonymous [Front cover] . . . . . . . . . . . . . c2--c2 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous Table of contents . . . . . . . . . . . nil1--nil1
Anonymous Editorial Announcement . . . . . . . . . 473--473 Anonymous Foreword . . . . . . . . . . . . . . . . 474--477 E. Horowitz and J. B. Munson An Expansive View of Reusable Software 477--487 T. C. Jones Reusability in Programming: A Survey of the State of the Art . . . . . . . . . . 488--494 T. A. Standish An Essay on Software Reuse . . . . . . . 494--497 R. G. Lanergan and C. A. Grasso Software Engineering with Reusable Designs and Code . . . . . . . . . . . . 498--501 Y. Matsumoto Some Experiences in Promoting Reusable Software: Presentation in Higher Abstract Levels . . . . . . . . . . . . 502--513 B. W. Kernighan The Unix System and Software Reusability 513--518 G. A. Curry and R. M. Ayers Experience with Traits in the Xerox Star Workstation . . . . . . . . . . . . . . 519--527 J. A. Goguen Parameterized Programming . . . . . . . 528--543 S. D. Litvintchouk and A. S. Matsumoto Design of Ada Systems Yielding Reusable Components: An Approach Using Structured Algebraic Specification . . . . . . . . 544--551 T. T. Cheng and E. D. Lock and N. S. Prywes Use of Very High Level Languages and Program Generation by Management Professionals . . . . . . . . . . . . . 552--563 J. M. Neighbors The Draco Approach to Constructing Software from Reusable Components . . . 564--574 J. M. Boyle and M. N. Muralidharan Program Reusability through Program Transformation . . . . . . . . . . . . . 574--588 T. E. Cheatham Reusability Through Program Transformations . . . . . . . . . . . . 589--594 E. Soloway and K. Ehrlich Empirical Studies of Programming Knowledge . . . . . . . . . . . . . . . 595--609 Anonymous Call For Papers . . . . . . . . . . . . 610--612 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous [Front cover] . . . . . . . . . . . . . c2--c2 Anonymous Table of contents . . . . . . . . . . . nil1--nil1
Anonymous A Note from the Editor-in-Chief . . . . 613--613 S. Jajodia and P. A. Ng Representative instances and $ \gamma $-acyclic relational schemes . . . . . . 614--618 D. R. Dolk and B. R. Konsynski Knowledge Representation for Model Management Systems . . . . . . . . . . . 619--628 U. Dayal and H. Y. Hwang View Definition and Generalization for Database Integration in a Multidatabase System . . . . . . . . . . . . . . . . . 628--645 R. Attar and P. A. Bernstein and N. Goodman Site Initialization, Recovery, and Backup in a Distributed Database System 645--650 C. Batini and M. Lenzerini A Methodology for Data Schema Integration in the Entity Relationship Model . . . . . . . . . . . . . . . . . 650--664 L. Lilien and B. Bhargava A Scheme for Batch Verification of Integrity Assertions in a Database System . . . . . . . . . . . . . . . . . 664--680 M. Hatzopoulos and J. G. Kollias On the Optimal Selection of Multilist Database Structures . . . . . . . . . . 681--687 A. Iannino and J. D. Musa and K. Okumoto and B. Littlewood Criteria for Software Reliability Model Comparisons . . . . . . . . . . . . . . 687--691 K. G. Shin and Y. H. Lee Evaluation of Error Recovery Blocks Used for Cooperating Processes . . . . . . . 692--700 J. C. Laprie Dependability Evaluation of Software Systems in Operation . . . . . . . . . . 701--714 C. Wong A Successful Software Development . . . 714--727 V. R. Basili and D. M. Weiss A Methodology for Collecting Valid Software Engineering Data . . . . . . . 728--738 N. B. Corrigan and J. D. Starkey A Concurrent General Purpose Operator Interface . . . . . . . . . . . . . . . 738--748 A. Ben-David and M. I. Ben-Porath and J. Z. Loeb and M. Rich An Industrial Software Engineering Retraining Course: Development Considerations and Lessons Learned . . . 748--755 B. Plattner Real-Time Execution Monitoring . . . . . 756--764 S. M. German Monitoring for Deadlock and Blocking in Ada Tasking . . . . . . . . . . . . . . 764--777 U. Manber Concurrent Maintenance of Binary Search Trees . . . . . . . . . . . . . . . . . 777--784 D. B. Benson Counting Paths: Nondeterminism as Linear Algebra . . . . . . . . . . . . . . . . 785--794 S. C. Ntafos On Required Element Testing . . . . . . 795--803 M. G. Khayat A Concurrency Measure . . . . . . . . . 804--810 D. W. Leinbaugh Selectors: High-Level Resource Schedulers . . . . . . . . . . . . . . . 810--825 T. Higashino and M. Mori and Y. Sugiyama and K. Taniguchi and T. Kasami An Algebraic Specification of HDLC Procedures and Its Verification . . . . 825--836 G. Serazzi and M. Calzarossa Adaptive Optimization of a System's Load 837--845 M. G. Gouda Closed Covers: To Verify Progress for Communicating Finite State Machines . . 846--855 H. Kameda A Property of Normalization Constants for Closed Queueing Networks . . . . . . 856--857 Anonymous 1984 Index \booktitleIEEE Transactions on Software Engineering . . . . . . . . 858--862 Anonymous Call for papers . . . . . . . . . . . . 863--864 Anonymous [Front cover] . . . . . . . . . . . . . c2--c2 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous Table of contents . . . . . . . . . . . nil1--nil1
Anonymous Editorial . . . . . . . . . . . . . . . 1--2 B. G. Claybrook and A. M. Claybrook and J. Williams Defining Database Views as Data Abstractions . . . . . . . . . . . . . . 3--14 C. Mohan and D. Fussell and Z. M. Kedem and A. Silberschatz Lock Conversion in Non-Two-Phase Locking Protocols . . . . . . . . . . . . . . . 15--22 F. Cristian A Rigorous Approach to Fault-Tolerant Programming . . . . . . . . . . . . . . 23--31 R. A. Kemmerer Testing Formal Specifications to Detect Design Errors . . . . . . . . . . . . . 32--43 G. T. Almes and A. P. Black and E. D. Lazowska and J. D. Noe The Eden System: A Technical Review . . 43--59 M. Ahamad and A. J. Bernstein An Application of Name Based Addressing to Low Level Distributed Algorithms . . 59--67 M. K. Sinha and N. Natarajan A Priority Based Distributed Deadlock Detection Algorithm . . . . . . . . . . 67--80 B. Dasarathy Timing Constraints of Real-Time Systems: Constructs for Expressing Them, Methods of Validating Them . . . . . . . . . . . 80--86 D. B. Lomet Making Pointers Safe in System Programming Languages . . . . . . . . . 87--96 M. Jarke and J. A. Tuner and E. A. Stohr and Y. Vassiliou and N. H. White and K. Michielsen A Field Evaluation of Natural Language for Data Retrieval . . . . . . . . . . . 97--114 J. Cohen and S. Kolodner Estimating the Speedup in Parallel Parsing . . . . . . . . . . . . . . . . 114--124 M. O. Fryer Risk Assessment of Computer Controlled Systems . . . . . . . . . . . . . . . . 125--129 G. Harrus A Model for the Basic Block Protocol of the Cambridge Ring . . . . . . . . . . . 130--136 A. Pashtan Operating System Models in a Concurrent Pascal Environment: Complexity and Performance Considerations . . . . . . . 136--141 Anonymous Call for papers . . . . . . . . . . . . 142--142 Anonymous Information for authors . . . . . . . . 143--143 Anonymous IEEE copyright form . . . . . . . . . . 143--143 Anonymous IEEE Computer Society Publications . . . 143--b-143--b Anonymous IEEE Computer Society . . . . . . . . . c2--c2 Anonymous \booktitleIEEE Transactions on Software Engineering --- Table of contents . . . c1--c1
D. L. Tuomenoksa and H. J. Siegel Task Scheduling on the PASM Parallel Processing System . . . . . . . . . . . 145--157 D. M. Weiss and V. R. Basili Evaluating Software Development by Analysis of Changes: Some Data from the Software Engineering Laboratory . . . . 157--168 I. J. Hayes Applying Formal Specification to Software Development in Industry . . . . 169--178 T. Yuasa and R. Nakajima IOTA: A Modular Programming System . . . 179--187 J. B. Peachey and R. B. Bunt and C. J. Colbourn Some Empirical Observations on Program Behavior with Applications to Program Restructuring . . . . . . . . . . . . . 188--193 S. Balsamo and G. Iazeolla Product-Form Synthesis of Queueing Networks . . . . . . . . . . . . . . . . 194--199 S. Muro and T. Ibaraki and H. Miyajima and T. Hasegawa Evaluation of the File Redundancy in Distributed Database Systems . . . . . . 199--205 A. Chan and R. Gray Implementing Distributed Read-Only Transactions . . . . . . . . . . . . . . 205--212 Hung-Chang Du On the File Design Problem for Partial Match Retrieval . . . . . . . . . . . . 213--222 R. K. Iyer and P. Velardi Hardware-Related Software Errors: Measurement and Analysis . . . . . . . . 223--231 H. A. Jensen and K. Vairavan An Experimental Study of Software Metrics for Real-Time Software . . . . . 231--234 E. G. Coffman and T. T. Kadota and L. A. Shepp On the Asymptotic Optimality of First-Fit Storage Allocation . . . . . . 235--239 Anonymous Call for papers . . . . . . . . . . . . 240--240 Anonymous Call for Papers and Panel Session Proposals . . . . . . . . . . . . . . . 240--240 Anonymous IEEE Computer Society Publications . . . 240--a-240--a Anonymous IEEE Computer Society . . . . . . . . . c2--c2 Anonymous \booktitleIEEE Transactions on Software Engineering --- Table of contents . . . c1--c1
W. E. Howden Foreword . . . . . . . . . . . . . . . . 241--241 M. Bidoit and B. Biebow and M. C. Gaudel and C. Gresse and G. D. Guiho Exception Handling: Formal Specification and Systematic Program Construction . . 242--252 S. W. Draper and D. A. Norman Software Engineering for User Interfaces 252--258 D. L. Parnas and P. C. Clements and D. M. Weiss The Modular Structure of Complex Systems 259--266 W. L. Johnson and E. Soloway PROUST: Knowledge-Based Program Understanding . . . . . . . . . . . . . 267--275 S. P. Reiss PECAN: Program Development Systems that Support Multiple Views . . . . . . . . . 276--285 W. Teitelman A Tour Through Cedar . . . . . . . . . . 285--302 R. N. Taylor and T. A. Standish Steps to an Advanced Ada$^1$ Programming Environment . . . . . . . . . . . . . . 302--310 Anonymous Advance Program . . . . . . . . . . . . 311--313 Anonymous Call for papers . . . . . . . . . . . . 314--314 Anonymous Call for Papers and Panel Session Proposals . . . . . . . . . . . . . . . 315--315 Anonymous Information for authors . . . . . . . . 315--315 Anonymous Beyond the Basics: A Software Publication Series for Successful Computer Professionals From the IEEE Computer Society . . . . . . . . . . . . 315--a-315--a Anonymous IEEE Computer Society Publications . . . 315--b-315--b Anonymous IEEE Computer Society . . . . . . . . . c2--c2 Anonymous \booktitleIEEE Transactions on Software Engineering --- Table of contents . . . c1--c1
V. Y. Shen and Tze-jie Yu and S. M. Thebaut and L. R. Paulsen Identifying Error-Prone Software --- an Empirical Study . . . . . . . . . . . . 317--324 S. Ceri and G. Gottlob Translating SQL Into Relational Algebra: Optimization, Semantics, and Equivalence of SQL Queries . . . . . . . . . . . . . 324--345 A. Thomasian Performance Evaluation of Centralized Databases with Static Locking . . . . . 346--355 N. Roussopoulos and R. T. Yeh SEES --- a Software testing Environment Support System . . . . . . . . . . . . . 355--366 S. Rapps and E. J. Weyuker Selecting Software Test Data Using Data Flow Information . . . . . . . . . . . . 367--375 T. Downs An Approach to the Modeling of Software Testing with Some Applications . . . . . 375--386 D. E. Comer and N. H. Gehani Flex: A High-Level Language for Specifying Customized Microprocessors 387--396 N. Natarajan Communication and Synchronization Primitives for Distributed Programs . . 396--416 M. K. Molloy Discrete Time Stochastic Petri Nets . . 417--423 J. Kramer and J. Magee Dynamic Configuration for Distributed Systems . . . . . . . . . . . . . . . . 424--436 Ching-Chy Wang and M. L. Soffa Eager Reclamation . . . . . . . . . . . 437--439 F. Luccio Variations on a Method for Representing Data Items of Unlimited Length . . . . . 439--441 Anonymous Call for Papers . . . . . . . . . . . . 442--442 Anonymous IEEE copyright form . . . . . . . . . . 443--443 Anonymous Beyond the Basics: A Software Publication Series for Successful Computer Professionals From the IEEE Computer Society . . . . . . . . . . . . 443--c-443--c Anonymous IEEE Computer Society Publications . . . 443--b-443--b Anonymous IEEE Computer Society . . . . . . . . . c2--c2 Anonymous \booktitleIEEE Transactions on Software Engineering --- Table of contents . . . c1--c1
Anonymous Editorial . . . . . . . . . . . . . . . 445--445 A. J. Bernstein A Loosely Coupled Distributed System for Reliably Storing Data . . . . . . . . . 446--454 D. B. MacQueen and D. T. Sannella Completeness of Proof Systems for Equational Specifications . . . . . . . 454--461 M. K. Sinha Atomic Actions and Resource Coordination Problems Having Nonunique Solutions . . 461--471 R. H. Perrott and D. Crookes and P. Milligan and W. R. M. Purdy A Compiler for an Array and Vector Processing Language . . . . . . . . . . 471--478 S. M. Ross Statistical Estimation of Software Reliability . . . . . . . . . . . . . . 479--483 G. Martella and B. Pernici and F. A. Schreiber An Availability Model for Distributed Transaction Systems . . . . . . . . . . 483--491 L. M. Ni and Kai Hwang Optimal Load Balancing in a Multiple Processor System with Many Job Classes 491--496 Anonymous Call for Papers . . . . . . . . . . . . 496--496 Anonymous Beyond the Basics: A Software Publication Series for Successful Computer Professionals From the IEEE Computer Society . . . . . . . . . . . . 496--b-496--b Anonymous IEEE Computer Society Publications . . . 496--a-496--a Anonymous IEEE Computer Society . . . . . . . . . c2--c2 Anonymous \booktitleIEEE Transactions on Software Engineering --- Table of contents . . . c1--c1
V. D. Gligor and P. A. B. Ng Foreword . . . . . . . . . . . . . . . . 497--501 K. P. Birman and T. A. Joseph and T. Raeuchle and A. El Abbadi Implementing Fault-Tolerant Distributed Objects . . . . . . . . . . . . . . . . 502--508 M. S. Mckendry Ordering Actions for Visibility . . . . 509--519 A. Z. Spector and J. Butcher and D. S. Daniels and D. J. Duchamp and J. L. Eppinger and C. E. Fineman and A. Heddaya and P. M. Schwarz Support for Distributed Transactions in the TABS Prototype . . . . . . . . . . . 520--530 B. Chor and B. A. Coan A Simple and Efficient Randomized Byzantine Agreement Algorithm . . . . . 531--539 K. J. Perry Randomized Byzantine Agreement . . . . . 539--546 O. Babao\uglu and R. Drummond Streets of Byzantium: Network Architectures for Fast Reliable Broadcasts . . . . . . . . . . . . . . . 546--554 R. D. Schlichting A Technique for Estimating Performance of Fault-Tolerant Programs . . . . . . . 555--563 N. Griffyth and J. A. Miller Performance Modeling of Database Recovery Protocols . . . . . . . . . . . 564--572 Anonymous Call for Papers . . . . . . . . . . . . 572--572 Anonymous Information for authors . . . . . . . . 572--572 Anonymous IEEE Computer Society Publications . . . 572--a-572--a Anonymous IEEE Computer Society . . . . . . . . . c2--c2 Anonymous \booktitleIEEE Transactions on Software Engineering --- Table of contents . . . c1--c1
P. B. Berra Foreword Computers Come and Go But Data Go On Forever . . . . . . . . . . . . . 573--573 R. P. Braegger and A. M. Dudler and J. Rebsamen and C. A. Zehnder Gambit: An Interactive Database Design Tool for Data Structures, Integrity Constraints, and Transactions . . . . . 574--583 D. B. Farmer and R. King and D. A. Myers The Semantic Database Constructor . . . 583--591 S. P. Ghosh An Application of Statistical Databases in Manufacturing Testing . . . . . . . . 591--598 S. D. Urban and J. E. Urban and W. D. Dominick Utilizing an Executable Specification Language for an Information System . . . 598--605 B. W. Wah and Yao-Nan Lien Design of Distributed Databases on Local Computer Systems with a Multiaccess Network . . . . . . . . . . . . . . . . 606--619 A. M. Keller and M. W. Wilkins On the Use of an Extended Relational Model to Handle Changing Incomplete Information . . . . . . . . . . . . . . 620--633 C. Parent and S. Spaccapietra An Algebra for a General Entity-Relationship Model . . . . . . . 634--643 D. Maier and D. Rozenshtein and J. Stein Representing Roles in Universal Scheme Interfaces . . . . . . . . . . . . . . . 644--652 Anonymous Call for papers . . . . . . . . . . . . 653--653 Anonymous Tutorial Week Washington 1985 . . . . . 654--654 Anonymous IEEE copyright form . . . . . . . . . . 655--655 Anonymous Beyond The Basics: A Software Publication Series for Successful Computer Professionals From the IEEE Computer Society . . . . . . . . . . . . 655--c-655--c Anonymous IEEE Computer Society Publications . . . 655--b-655--b Anonymous IEEE Computer Society . . . . . . . . . c2--c2 Anonymous \booktitleIEEE Transactions on Software Engineering --- Table of contents . . . c1--c1
V. Berzins and M. Gray Analysis and Design in MSG.84: Formalizing Functional Specifications 657--670 U. H. Chi Formal Specification of User Interfaces: A Comparison and Evaluation of Four Axiomatic Approaches . . . . . . . . . . 671--685 L. J. Bass An Approach to User Specification of Interactive Display Interfaces . . . . . 686--698 A. I. Wasserman Extending State Transition Diagrams for the Specification of Human--Computer Interaction . . . . . . . . . . . . . . 699--713 J. Gait An Aspect of Aesthetics in Human--Computer Communications: Pretty Windows . . . . . . . . . . . . . . . . 714--717 F. B. Bastani Experiences with a Feedback Version Development Methodology . . . . . . . . 718--723 Shi-Kuo Chang and Wu-Lung Chan Transformation and Verification of Office Procedures . . . . . . . . . . . 724--734 A. Mili Towards a Theory of Forward Error Recovery . . . . . . . . . . . . . . . . 735--748 D. H. Hutchens and V. R. Basili System Structure Analysis: Clustering with Data Bindings . . . . . . . . . . . 749--757 A. Gabrielian and L. P. McNamee and D. J. Trawick The Qualified Function Approach to Analysis of Program Behavior and Performance . . . . . . . . . . . . . . 758--773 K. Ramamritham Synthesizing Code for Resource Controllers . . . . . . . . . . . . . . 774--783 V. Ambriola and F. Giannotti and D. Pedreschi and F. Turini Symbolic Semantics and Program Reduction 784--794 C. T. Yu and C. C. Chang and M. Templeton and D. Brill and E. Lund Query Processing in a Fragmented Relational Distributed System: Mermaid 795--810 Shi-Kuo Chang and E. Jungert and S. Levialdi and G. Tortora and T. Ichikawa An Image Processing Language with Icon-Assisted Navigation . . . . . . . . 811--819 G. T. Wuu and A. J. Bernstein False Deadlock Detection in Distributed Systems . . . . . . . . . . . . . . . . 820--821 E. H. Bersoff Comments on ``Elements of Software Configuration Management'' . . . . . . . 822--822 M. G. Khayat and W. S. Breger and M. Freiling and T. G. Lewis Correction to ``A Concurrency Measure'' 822--822 Anonymous Call for papers . . . . . . . . . . . . 823--823 Anonymous Beyond the Basics: A Software Publication Series for Successful Computer Professionals From the IEEE Computer Society . . . . . . . . . . . . 823--c-823--c Anonymous IEEE Computer Society Publications . . . 823--b-823--b Anonymous Tutorial Week Washington 1985 . . . . . 823--a-823--a Anonymous IEEE Computer Society . . . . . . . . . c2--c2 Anonymous \booktitleIEEE Transactions on Software Engineering --- Table of contents . . . c1--c1
B. D. Shriver An Introduction to \booktitleIEEE Software . . . . . . . . . . . . . . . . 829--829 Anonymous \booktitleIEEE Software . . . . . . . . 829--a-829--d N. L. Marselos Foreword Technical Conferences: A Window to the Future . . . . . . . . . . . . . 830--831 C. Wilson and L. J. Osterweil Omega --- a Data Flow Analysis Tool for the C Programming Language . . . . . . . 832--838 R. Troy and R. Moawad Assessment of Software Reliability Models . . . . . . . . . . . . . . . . . 839--849 S. S. Yau and J. S. Collofello Design Stability Measures for Software Maintenance . . . . . . . . . . . . . . 849--856 F. B. Bastani On the Uncertainty in the Correctness of Computer Programs . . . . . . . . . . . 857--864 L. Lilien and B. Bhargava Database Integrity Block Construct: Concepts and Design Issues . . . . . . . 865--885 C. V. Ramamoorthy and S. T. Dong and Y. Usuda An Implementation of an Automated Protocol Synthesizer (APS) and Its Application to the X.21 Protocol . . . . 886--908 H. M. Sneed and A. Merey Automated Software Quality Assurance . . 909--916 T. J. Mc Cabe and G. G. Schulmeyer System Testing Aided by Structured Analysis: A Practical Experience . . . . 917--921 B. W. Wah and Chee Fen Yu Stochastic Modeling of Branch-and-Bound Algorithms with Best-First Search . . . 922--934 M. S. Karasik Environmental Testing Techniques for Software Certification . . . . . . . . . 934--938 B. P. Mc Cune and R. M. Tong and J. S. Dean and D. G. Shapiro RUBRIC: A System for Rule-Based Information Retrieval . . . . . . . . . 939--945 M. Azuma and T. Tabata and Y. Oki and S. Kamiya SPD: A Humanized Documentation Technology . . . . . . . . . . . . . . . 945--953 M. Yoshida and K. Mizumachi and A. Wakino and I. Oyake and Y. Matsushita Time and Cost Evaluation Schemes of Multiple Copies of Data in Distributed Database Systems . . . . . . . . . . . . 954--959 C. T. Yu and Man-Keung Siu and K. Lam and C. H. Chen Adaptive File Allocation in Star Computer Network . . . . . . . . . . . . 959--965 C. R. Carlson and A. K. Arora Toward the Next Generation of Data Modeling Tools . . . . . . . . . . . . . 966--970 C. L. Cline and H. J. Siegel Augmenting Ada for SIMD Parallel Processing . . . . . . . . . . . . . . . 970--977 C. W. Doerflinger and V. R. Basili Monitoring Software Development Through Dynamic Variables . . . . . . . . . . . 978--985 D. Keirsey and J. Mitchell and B. Bullock and T. Nussmeir and D. Y. Tseng Autonomous Vehicle Control Using Al Techniques . . . . . . . . . . . . . . . 986--992 Anonymous Call for Papers . . . . . . . . . . . . 992--992 Anonymous Beyond The Basics: A Software Publication Series for Successful Computer Professionals From the IEEE Computer Society . . . . . . . . . . . . 992--b-992--b Anonymous IEEE Computer Society Publications . . . 992--a-992--a Anonymous IEEE Computer Society . . . . . . . . . c2--c2 Anonymous \booktitleIEEE Transactions on Software Engineering --- Table of contents . . . c1--c1
Anonymous Editorial . . . . . . . . . . . . . . . 993--993 A. H. Konstam and D. E. Wood Software Science Applied to APL . . . . 994--1000 C. P. Kruskal and A. Weiss Allocating Independent Subtasks on Parallel Processors . . . . . . . . . . 1001--1016 F. Panzieri and B. Randell Interfacing UNIX to Data Communications Networks . . . . . . . . . . . . . . . . 1016--1032 R. Ford and K. Miller Abstract Data Type Development and Implementation: An Example . . . . . . . 1033--1037 H. K. T. Wong Foreword . . . . . . . . . . . . . . . . 1038--1039 A. Shoshani and H. K. T. Wong Statistical and Scientific Database Issues . . . . . . . . . . . . . . . . . 1040--1047 M. A. Bassiouni Data Compression in Scientific and Statistical Databases . . . . . . . . . 1047--1058 S. N. Khoshafian and D. M. Bates and D. J. De Witt Efficient Support of Statistical Operations . . . . . . . . . . . . . . . 1058--1070 G. Ozsoyoglu and Z. M. Ozsoyoglu Statistical Database Query Languages . . 1071--1081 N. C. Rowe Antisampling for Estimation: An Overview 1081--1091 S. F. Lundstrom and E. E. Swartzlander Foreword Advances in Distributed Computing Systems . . . . . . . . . . . 1092--1096 A. L. P. Chen and V. O. K. Li An Optimal Algorithm for Processing Distributed Star Queries . . . . . . . . 1097--1107 D. M. Topkis Concurrent Broadcast for Information Dissemination . . . . . . . . . . . . . 1107--1112 J. P. Huang Modeling of Software Partition for Distributed Real-Time Applications . . . 1113--1126 Kwei-Jay Lin and J. D. Gannon Atomic Remote Procedure Call . . . . . . 1126--1135 B. Szymanski and Yuan Shi and N. S. Prywes Synchronized Distributed Termination . . 1136--1140 J. A. Stankovic Stability and Distributed Scheduling Algorithms . . . . . . . . . . . . . . . 1141--1152 L. M. Ni and Chong-Wei Xu and T. B. Gendreau A Distributed Drafting Algorithm for Load Balancing . . . . . . . . . . . . . 1153--1161 K. A. Lantz and W. I. Nowicki and A. M. Theimer An Empirical Study of Distributed Application Performance . . . . . . . . 1162--1174 A. P. Sheth and A. Singhal and M. T. Liu An Analysis of the Effect of Network Parameters on the Performance of Distributed Database Systems . . . . . . 1174--1184 C. S. Raghavendra and S. Hariri Reliability Optimization in the Design of Distributed Systems . . . . . . . . . 1184--1193 S. M. Shatz Post-Failure Reconfiguration of CSP Programs . . . . . . . . . . . . . . . . 1193--1202 A. Thomasian and P. F. Bay Integrated Performance Models for Distributed Processing in Computer Communication Networks . . . . . . . . . 1203--1216 K. Garg An Approach to Performance Specification of Communication Protocols Using Timed Petri Nets . . . . . . . . . . . . . . . 1216--1225 M. T. Ozsu Modeling and Analysis of Distributed Database Concurrency Control Algorithms Using an Extended Petri Net Formalism 1225--1240 M. G. Gouda and Hui-Seng Lee Proving Liveness and Termination of Systolic Arrays Using Communicating Finite State Machines . . . . . . . . . 1240--1251 Anonymous Call for papers . . . . . . . . . . . . 1252--1252 Anonymous IEEE Computer Society Publications . . . 1252--a-1252--a Anonymous \booktitleIEEE Transactions on Software Engineering --- Table of contents . . . c1--1252 Anonymous IEEE Computer Society . . . . . . . . . c2--c2
J. Mostow Foreword What is AI? And What Does It Have to Do with Software Engineering? 1253--1256 R. Balzer A 15 Year Perspective on Automatic Programming . . . . . . . . . . . . . . 1257--1268 S. F. Fickas Automating the Transformational Development of Software . . . . . . . . 1268--1277 D. R. Smith and G. B. Kotik and S. J. Westfold Research on Knowledge-Based Software Environments at Kestrel Institute . . . 1278--1295 R. C. Waters The Programmer's Apprentice: A Session with KBEmacs . . . . . . . . . . . . . . 1296--1320 D. R. Barstow Domain-Specific Automatic Programming 1321--1336 R. Neches and W. R. Swartout and J. D. Moore Enhanced Maintenance and Explanation of Expert Systems Through Explicit Models of Their Development . . . . . . . . . . 1337--1351 B. Adelson and E. Soloway The Role of Domain Experience in Software Design . . . . . . . . . . . . 1351--1360 E. Kant Understanding and Automating Algorithm Design . . . . . . . . . . . . . . . . . 1361--1374 D. M. Steier and E. Kant The Roles of Execution and Analysis in Algorithm Design . . . . . . . . . . . . 1375--1386 J. Doyle Expert Systems and the ``Myth'' of Symbolic Reasoning . . . . . . . . . . . 1386--1390 P. A. Subrahmanyam The ``Software Engineering'' of Expert Systems: Is Prolog Appropriate? . . . . 1391--1400 D. G. Bobrow If Prolog is the Answer, What is the Question? or What it Takes to Support AI Programming Paradigms . . . . . . . . . 1401--1408 Anonymous Call for Papers . . . . . . . . . . . . 1408--1408 Anonymous IEEE Computer Society Publications . . . 1408--a-1408--a Anonymous IEEE Computer Society . . . . . . . . . c2--c2 Anonymous \booktitleIEEE Transactions on Software Engineering --- Table of contents . . . c1--c1
A. L. Goel and F. B. Bastani Foreword Software Reliability . . . . . 1409--1410 Anonymous List of referees . . . . . . . . . . . . 1410--1410 A. L. Goel Software Reliability Models: Assumptions, Limitations, and Applicability . . . . . . . . . . . . . 1411--1423 K. Okumoto A Statistical Method for Software Quality Control . . . . . . . . . . . . 1424--1430 S. Yamada and S. Osaki Software Reliability Growth Modeling: Models and Applications . . . . . . . . 1431--1437 R. K. Iyer and D. J. Rossetti Effect of System Workload on Operating System Reliability: A Study on IBM 3081 1438--1448 J. P. Cavano Toward High Confidence Software . . . . 1449--1455 N. D. Singpurwalla and R. Soyer Assessing (Software) Reliability Growth Using a Random Coefficient Autoregressive Process and Its Ramifications . . . . . . . . . . . . . 1456--1464 W. S. Jewell Bayesian Extensions to a Basic Model of Software Reliability . . . . . . . . . . 1465--1471 S. M. Ross Software Reliability: The Stopping Rule Problem . . . . . . . . . . . . . . . . 1472--1476 D. J. Richardson and L. A. Clarke Partition Analysis: A Method Combining Testing and Verification . . . . . . . . 1477--1490 A. Avizienis The $N$-Version Approach to Fault-Tolerant Software . . . . . . . . 1491--1501 T. Anderson and P. A. Barrett and D. N. Halliwell and M. R. Moulding Software Fault Tolerance: An Evaluation 1502--1510 D. E. Eckhardt and L. D. Lee A Theoretical Basis for the Analysis of Multiversion Software Subject to Coincident Errors . . . . . . . . . . . 1511--1517 Anonymous Call for Papers . . . . . . . . . . . . 1517--1517 Anonymous Call for Papers . . . . . . . . . . . . 1517--1517 Anonymous 1985 Index \booktitleIEEE Transactions on Software Engineering Vol. SE-11 . . . 1517--1517 Anonymous IEEE Computer Society Publications . . . 1517--l-1517--l Anonymous IEEE Finding Your Way . . . . . . . . . 1517--j-1517--j Anonymous IEEE Computer Society . . . . . . . . . c2--c2 Anonymous \booktitleIEEE Transactions on Software Engineering --- Table of contents . . . c1--c1
Anonymous Contents . . . . . . . . . . . . . . . . 1--1 Anonymous IEEE copyright form . . . . . . . . . . 1--2 A. L. Goel and F. B. Bastani Foreword software reliability . . . . . 1--2 P. A. Currit and M. Dyer and H. D. Mills Certifying the reliability of software 3--11 D. R. Miller Exponential order statistic models of software reliability growth . . . . . . 12--24 F. W. Scholz Software reliability modeling and analysis . . . . . . . . . . . . . . . . 25--31 U. Sumita and Y. Masuda Analysis of software availability/reliability under the influence of hardware failures . . . . . 32--41 V. K. P. Kumar and S. Hariri and C. S. Raghavendra Distributed program reliability analysis 42--50 H. Hecht and M. Hecht Software reliability in the system context . . . . . . . . . . . . . . . . 51--58 P. Jalote and R. H. Campbell Atomic actions for fault-tolerance using CSP . . . . . . . . . . . . . . . . . . 59--68 D. J. Taylor Concurrency and forward recovery in atomic actions . . . . . . . . . . . . . 69--78 L. Mancini Modular redundancy in a message passing system . . . . . . . . . . . . . . . . . 79--86 J. S. Upadhyaya and K. K. Saluja A watchdog processor based general rollback technique with multiple retries 87--95 J. C. Knight and N. G. Leveson An experimental evaluation of the assumption of independence in multiversion programming . . . . . . . . 96--109 J. R. Dunham Experiments in software reliability: Life-critical applications . . . . . . . 110--123 I. J. Hayes Specification directed module testing 124--133 H. Tsubotani and N. Monden and M. Tanaka and T. Ichikawa A high level language-based computing environment to support production and execution of reliable programs . . . . . 134--146 A. I. Wasserman and P. A. Pircher and D. T. Shewmake Building reliable interactive information systems . . . . . . . . . . 147--156 R. E. Strom and S. Yemini Typestate: A programming language concept for enhancing software reliability . . . . . . . . . . . . . . 157--171 Z. L. Lichtman Generation and consistency checking of design and program structures . . . . . 172--181 Anonymous Call for papers . . . . . . . . . . . . 182--182 Anonymous [Inside front cover] . . . . . . . . . . c2--c2
Anonymous Ada --- applications and environments 1--1 Anonymous Call for papers . . . . . . . . . . . . 1--1 G. D. Bergland and P. Zave Guest Editors' prologue special issue on software design methods . . . . . . . . 185--191 H. D. Mills and R. C. Linger Data structured programming: Program design without arrays and pointers . . . 192--197 P. T. Ward The transformation schema: An extension of the data flow diagram to represent control and timing . . . . . . . . . . . 198--210 G. Booch Object-oriented development . . . . . . 211--221 J. R. Cameron An overview of JSD . . . . . . . . . . . 222--240 P. Henderson Functional programming, formal specification, and rapid prototyping . . 241--250 D. L. Parnas and P. C. Clements A rational design process: How and why to fake it . . . . . . . . . . . . . . . 251--257 H. J. Barnard and R. F. Metz and A. L. Price A recommended practice for describing software designs: IEEE standards project 1016 . . . . . . . . . . . . . . . . . . 258--263 D. N. Card and V. E. Church and W. W. Agresti An empirical study of software design practices . . . . . . . . . . . . . . . 264--271 L. S. Levy A metaprogramming method and its economic justification . . . . . . . . . 272--277 G. S. Avrunin and L. K. Dillon and J. C. Wileden and W. E. Riddle Constrained expressions: Adding analysis capabilities to design methods for concurrent software systems . . . . . . 278--292 G. Estrin and R. S. Fenchel and R. R. Razouk and M. K. Vernon SARA (System ARchitects Apprentice): Modeling, analysis, and simulation support for design of concurrent systems 293--311 P. Zave and W. Schell Salient features of an executable specification language and its environment . . . . . . . . . . . . . . 312--325 A. I. Wasserman and P. A. Pircher and D. T. Shewmake and M. L. Kersten Developing interactive information systems with the User Software Engineering methodology . . . . . . . . 326--345 G. Bruno and G. Marchetto Process-translatable Petri nets for the rapid prototyping of process control systems . . . . . . . . . . . . . . . . 346--357 J. S. Tseng and B. Szymanski and Y. Shi and N. S. Prywes Real-time software life cycle with the model system . . . . . . . . . . . . . . 358--373 Anonymous Call for papers . . . . . . . . . . . . 374--374
Anonymous Call for papers . . . . . . . . . . . . 1--1 Anonymous Call for papers . . . . . . . . . . . . 1--1 Anonymous Call for papers . . . . . . . . . . . . 1--1 S. Rutenstreich and W. E. Howden Two-dimensional program design . . . . . 377--384 K. Schwan and A. K. Jones Flexible software development for multiple computer systems . . . . . . . 385--401 F. J. Polster Reuse of software through generation of partial systems . . . . . . . . . . . . 402--416 G. D. Kimura A structure editor for abstract document objects . . . . . . . . . . . . . . . . 417--435 C. H. C. Leung Dynamic storage fragmentation and file deterioration . . . . . . . . . . . . . 436--441 A. Moitra and S. S. Iyengar Derivation of a parallel algorithm for balancing binary trees . . . . . . . . . 442--449 H. G. Perros and T. Altiok Approximate analysis of open networks of queues with blocking: Tandem configurations . . . . . . . . . . . . . 450--461 M. K. Sinha Commutable transactions and the time\_pad synchronization mechanism for distributed systems . . . . . . . . . . 462--476 K. J. Perry and S. Toueg Distributed agreement in the presence of processor and communication faults . . . 477--482 B. Indurkhya and H. S. Stone and L. Xi-Cheng Optimal partitioning of randomly generated distributed programs . . . . . 483--495 J. E. Gaffney The impact on software development costs of using HOL's . . . . . . . . . . . . . 496--499 L. M. Ni and K. Hwang Correction to ``Optimal load balancing in a multiple processor system with many job classes'' . . . . . . . . . . . . . 500--500 Anonymous Call for papers . . . . . . . . . . . . 502--502
Anonymous Call for papers . . . . . . . . . . . . 1--1 G. S. Hura and H. Singh and N. K. Nanda Some design aspects of databases through Petri net modeling . . . . . . . . . . . 505--510 M. Tsuchiya and M. P. Mariani and J. D. Brom Distributed database management model and validation . . . . . . . . . . . . . 511--520 A. Ha\'c A decomposition solution to a queueing network model of a distributed file system with dynamic locking . . . . . . 521--530 N. Natarajan A distributed scheme for detecting communication deadlocks . . . . . . . . 531--537 C. Batini and E. Nardelli and R. Tamassia A layout algorithm for data flow diagrams . . . . . . . . . . . . . . . . 538--546 F. Baiardi and N. De Francesco and G. Vaglini Development of a debugger for a concurrent language . . . . . . . . . . 547--553 L. M. Patnaik and K. V. Iyer Load-leveling in fault-tolerant distributed computing systems . . . . . 554--560 G. Balbo and S. C. Bruell and S. Ghanta Combining queueing network and Generalized Stochastic Petri Net models for the analysis of some software blocking phenomena . . . . . . . . . . . 561--576 B. K. Hillyer and D. E. Shaw and A. Nigam NON-VON's performance on certain database benchmarks . . . . . . . . . . 577--583 M. Trachtenberg Validating Halstead's theory with System 3 data . . . . . . . . . . . . . . . . . 584--584 M. Lipow Comments on ``Estimating the number of faults in code'' and two corrections to published data . . . . . . . . . . . . . 584--585 Anonymous Call for papers . . . . . . . . . . . . 586--587
Anonymous Editorial . . . . . . . . . . . . . . . 589--589 D. M. Yellin and E. M. M. Mueckstein The automatic inversion of attribute grammars . . . . . . . . . . . . . . . . 590--599 T. V. Lakshman and A. K. Agrawala Efficient decentralized consensus protocols . . . . . . . . . . . . . . . 600--607 W. E. Hall and S. H. Zweben The cloze procedure and software comprehensibility measurement . . . . . 608--623 T. Ichikawa and M. Hirakawa ARES: A relational database with the capability of performing flexible interpretation of queries . . . . . . . 624--634 K. Ramamritham and D. Stemple and D. A. Briggs and S. Vinter Privilege transfer and revocation in a port-based system . . . . . . . . . . . 635--648 B. Belkhouche and J. E. Urban Direct implementation of abstract data types from abstract specifications . . . 649--661 D. L. Eager and E. D. Lazowska and J. Zahorjan Adaptive load sharing in homogeneous distributed systems . . . . . . . . . . 662--675 Anonymous Call for papers . . . . . . . . . . . . 676--676
Anonymous Call for papers . . . . . . . . . . . . 1--1 Anonymous Editorial . . . . . . . . . . . . . . . 677--677 D. Ferrari Considerations on the insularity of performance evaluation . . . . . . . . . 678--683 J. N. Gray An approach to decentralized computer systems . . . . . . . . . . . . . . . . 684--692 E. W. Martin and R. A. De Millo Operational survivability in gracefully degrading distributed processing systems 693--704 R. F. Mathis The last 10 percent . . . . . . . . . . 705--712 S. S. Yau and J. J. P. Tsai A survey of software design techniques 713--721 Anonymous Call for papers . . . . . . . . . . . . 722--723
Anonymous Call for papers . . . . . . . . . . . . 1--1 Anonymous Foreword . . . . . . . . . . . . . . . . 725--725 H. A. Simon Whether software engineering needs to be artificially intelligent . . . . . . . . 726--732 V. R. Basili and R. W. Selby and D. H. Hutchens Experimentation in software engineering 733--743 M. E. Fagan Advances in software inspections . . . . 744--751 A. T. Goldberg Knowledge-based programming: A survey of program design and construction techniques . . . . . . . . . . . . . . . 752--768 C. V. Ramamoorthy and V. Garg and A. Prakash Programming in the large . . . . . . . . 769--783 H. Weber and H. Ehrig Specification of modular systems . . . . 784--798 Anonymous Call for papers . . . . . . . . . . . . 799--799
Tak-Sun Yuen and David Huang-Chang Du Dynamic file structure for partial match retrieval based on overflow bucket sharing . . . . . . . . . . . . . . . . 801--810 R. H. Campbell and B. Randell Error recovery in asynchronous systems 811--826 T. P. Blumer and D. P. Sidhu Mechanical verification and automatic implementation of communication protocols . . . . . . . . . . . . . . . 827--843 C. M. Woodside and S. K. Tripathi Optimal allocation of file servers in a local network environment . . . . . . . 844--848 E. Horqwitz and R. C. Williamson SODOS: A software documentation support environment --- Its definition . . . . . 849--859 B. Meandzija A formal method for composing a network command language . . . . . . . . . . . . 860--865 R. P. Trueblood and A. Sengupta Dynamic analysis of the effects access rule modifications have upon security 866--870 K. C. Tai and A. L. Tharp A comparison of computed chaining to predictors . . . . . . . . . . . . . . . 870--874 D. L. Parnas and P. C. Clements Correction to ``A rational design process: How and why to fake it'' . . . 874--874 Anonymous Call for papers . . . . . . . . . . . . 875--876
S. Bologna and N. G. Leveson Foreword reliability and safety in real-time systems . . . . . . . . . . . 877--878 B. Auernheimer and R. A. Kemmerer RT-ASLAN: A specification language for real-time systems . . . . . . . . . . . 879--889 F. Jahanian and A. K. L. Mok Safety analysis of timing properties in real-time systems . . . . . . . . . . . 890--904 P. G. Neumann On hierarchical design of computer systems for critical applications . . . 905--920 A. M. Tyrrell and D. J. Holding Design of reliable software in distributed systems using the conversation scheme . . . . . . . . . . 921--928 P. G. Bishop and D. G. Esp and M. Barnes and P. Humphreys and G. Dahll and J. Lahti PODS --- A project on diverse software 929--940 E. Kligerman and A. D. Stoyenko Real-Time Euclid: A language for reliable real-time systems . . . . . . . 941--949 A. A. Abdel-Ghaly and P. Y. Chan and B. Littlewood Evaluation of competing software reliability predictions . . . . . . . . 950--967 R. Troy and Y. Romain A statistical methodology for the study of the software failure process and its application to the ARGOS center . . . . 968--978 T. Downs Extensions to an approach to the modeling of software testing with some performance comparisons . . . . . . . . 979--987 R. E. Bloomfield and P. K. D. Froome The application of formal methods to the assessment of high integrity software 988--993 Anonymous Call for papers . . . . . . . . . . . . 994--995 B. Dhillon IASTED conference on reliability and quality control . . . . . . . . . . . . 996--996
W. E. Howden A functional approach to program testing and analysis . . . . . . . . . . . . . . 997--1005 D. W. Cornell and D. M. Dias and P. S. Yu On multisystem coupling through function request shipping . . . . . . . . . . . . 1006--1017 D. Towsley Allocating programs containing branches and loops within a multiple processor system . . . . . . . . . . . . . . . . . 1018--1024 A. E. Conway and N. D. Georganas Decomposition and aggregation by class in closed queueing networks . . . . . . 1025--1040 C. M. Woodside Controllability of computer performance tradeoffs obtained using controlled-share queue schedulers . . . 1041--1048
H. Kameda The gains from computer communication 1049--1055 D. W. Stemple and S. T. Vinter and K. Ramamritham Functional addressing in Gutenberg: Interprocess communication without process identifiers . . . . . . . . . . 1056--1066 A. B. Sheltzer and G. J. Popek Internet Locus: Extending transparency to an Internet environment . . . . . . . 1067--1075 E. Horowitz and R. C. Williamson SODOS: A software documentation support environment --- Its use . . . . . . . . 1076--1087 T. Y. Cheung On the projection method for protocol verification . . . . . . . . . . . . . . 1088--1089 A. L. Liestman and R. H. Campbell A fault-tolerant scheduling problem . . 1089--1095 S. Kundu The call-return tree and its application to program performance analysis . . . . 1096--1098 H. Arisawa and T. Miura On the properties of extended inclusion dependences . . . . . . . . . . . . . . 1098--1101 Anonymous Call for papers . . . . . . . . . . . . 1102--1103 B. Dhillon IASTED conference on reliability and quality control . . . . . . . . . . . . 1104--1104
Anonymous Advance program . . . . . . . . . . . . 1--1 Anonymous Data engineering registration form . . . 1--1 Anonymous Author index . . . . . . . . . . . . . . 1--7 Anonymous Editorial . . . . . . . . . . . . . . . 1105--1105 S. P. Ghosh Statistical relational tables for statistical database management . . . . 1106--1116 A. N. Habermann and D. Notkin Gandalf: Software development environments . . . . . . . . . . . . . . 1117--1127 E. J. Weyuker Axiomatizing software test data adequacy 1128--1138 D. W. Leinbaugh and M. R. Yamini Guaranteed response times in a distributed hard-real-time environment 1139--1144 F. Stetter Comments on ``Number of faults per line of code'' . . . . . . . . . . . . . . . 1145--1145 Anonymous Call for papers . . . . . . . . . . . . 1153--1154
F. Cristian and D. Skeen Foreword Special Issue on Distributed Systems . . . . . . . . . . . . . . . . 1--2 Anonymous List of referees . . . . . . . . . . . . 2--2 I. Cidon and J. M. Jaffe and M. Sidi Local Distributed Deadlock Detection by Cycle Detection and Clustering . . . . . 3--14 W. K. Fuchs and Kun-Lung Wu and J. A. Abraham Companson and Diagnosis of Large Replicated Files . . . . . . . . . . . . 15--22 R. Koo and S. Toueg Checkpointing and Rollback-Recovery for Distributed Systems . . . . . . . . . . 23--31 F. C. H. Lin and R. M. Keller The Gradient Model Load Balancing Method 32--38 S. K. Sarin and N. A. Lynch Discarding Obsolete Information in a Replicated Database System . . . . . . . 39--47 D. B. Terry Caching Hints in Distributed Systems . . 48--54 W. E. Weihl Distributed Version Management for Read-Only Actions . . . . . . . . . . . 55--64 A. Black and N. Hutchinson and E. Jul and H. Levy and L. Carter Distribution and Abstract Types in Emerald . . . . . . . . . . . . . . . . 65--76 P. B. Gibbons A Stub Generator for Multilanguage RPC in Heterogeneous Environments . . . . . 77--87 M. L. Scott Language Support for Loosely Coupled Distributed Programs . . . . . . . . . . 88--103 G. R. Andrews and R. D. Schlichting and R. Hayes and T. D. M. Purdin The Design of the Saguaro Distributed Operating System . . . . . . . . . . . . 104--118 Anonymous Information for authors . . . . . . . . 119--119 Anonymous IEEE copyright form . . . . . . . . . . 119--119 Anonymous The Third International Conference on Data Engineering . . . . . . . . . . . . 119--119 Anonymous IEEE Computer Society Publications . . . 119--f-119--f Anonymous The One Leveraged Investment With a Guaranteed Return . . . . . . . . . . . 119--d-119--e Anonymous IEEE Computer Society . . . . . . . . . c2--c2 Anonymous \booktitleIEEE Transactions on Software Engineering --- Table of contents . . . c1--c1
Anonymous Guest Editors' Note . . . . . . . . . . 125--128 D. E. Denning and S. G. Akl and M. Heckman and T. F. Lunt and M. Morgenstern and P. G. Neumann and R. R. Schell Views for Multilevel Database Security 129--140 J. T. Haigh and W. D. Young Extending the Noninterference Version of MLS for SAT . . . . . . . . . . . . . . 141--150 J. D. Halpern and S. Owre and N. Proctor and W. F. Wilson Muse --- a Computer Assisted Verification System . . . . . . . . . . 151--156 J. T. Haigh and R. A. Kemmerer and J. Mchugh and W. D. Young An Experience Using Two Covert Channel Analysis Techniques on a Real System Design . . . . . . . . . . . . . . . . . 157--168 V. D. Gligor and C. S. Chandersekaran and Wen-Der Jiang and A. Johri and G. L. Luckenbaugh and L. E. Reich A New Security Testing Method and Its Application to the Secure Xenix Kernel 169--183 D. M. Berry Towards a Formal Basis for the Formal Development Method and the Ina Jo Specification Language . . . . . . . . . 184--201 R. Y. Kain and C. E. Landwehr On Access Checking in Capability-Based Systems . . . . . . . . . . . . . . . . 202--207 V. D. Gligor and C. S. Chandersekaran and R. S. Chapman and L. J. Dotterer and M. S. Hetch and Wen-Der Jiang and A. Johri and G. L. Luckenbaugh and N. Vasudevan Design and Implementation of Secure Xenix . . . . . . . . . . . . . . . . . 208--221 D. E. Denning An Intrusion-Detection Model . . . . . . 222--232 D. M. Nessett Factors Affecting Distributed System Security . . . . . . . . . . . . . . . . 233--248 D. Estrin Controls for Interorganization Networks 249--261 J. H. Moore and G. J. Simmons Cycle Structure of the DES for Keys Having Palindromic (or Antipalindromic) Sequences of Round Keys . . . . . . . . 262--273 J. K. Millen and S. C. Clark and S. B. Freedman The Interrogator: Protocol Secuity Analysis . . . . . . . . . . . . . . . . 274--288 C. Meadows and D. Mutchler Matching Secrets in the Absence of a Continuously Available Trusted Authority 289--292 C. G. Girling Covert Channels in LAN's . . . . . . . . 292--296 Anonymous 9th Annual International Conference on Software Engineering . . . . . . . . . . 296--296 Anonymous Call for Papers . . . . . . . . . . . . 296--296 Anonymous IEEE Computer Society Publications . . . 296--e-296--e Anonymous IEEE Computer Society . . . . . . . . . c2--c2 Anonymous \booktitleIEEE Transactions on Software Engineering --- Table of contents . . . c1--c1
N. F. Schneidewind Introduction to the Special Section on Software Maintenance . . . . . . . . . . 301--301 Anonymous List of referees . . . . . . . . . . . . 302--302 N. F. Schneidewind The State of Software Maintenance . . . 303--310 S. Bendifallah Understanding Software Maintenance Work 311--323 K. Narayanaswamy and W. Scacchi Maintaining Configurations of Evolving Software Systems . . . . . . . . . . . . 324--334 D. Kafura and G. R. Reddy The Use of Software Complexity Metrics in Software Maintenance . . . . . . . . 335--343 H. D. Rombach A Controlled Experiment on the Impact of Software Structure on Maintainability 344--354 S. S. Yau and J. J. Tsai Knowledge Representation of Software Component Interconnection Information for Large-Scale Software Modifications 355--361 R. B. Bunt Foreword . . . . . . . . . . . . . . . . 362--362 V. F. Nicola and V. G. Kulkarni and K. S. Trivedi Queueing Analysis of Fault-Tolerant Computer Systems . . . . . . . . . . . . 363--375 K. C. Sevick and M. J. Johnson Cycle Time Properties of the FDDI Token Ring Protocol . . . . . . . . . . . . . 376--385 N. G. Leveson and J. L. Stolzy Safety Analysis Using Petri Nets . . . . 386--397 Y. K. Dalal A Distributed Algorithm for Constructing Minimal Spanning Trees . . . . . . . . . 398--405 Anonymous Call for papers . . . . . . . . . . . . 406--407 Anonymous Beyond The Basics: A Software Publication Series for Successful Computer Professionals From the IEEE Computer Society . . . . . . . . . . . . 407--c-407--c Anonymous IEEE Computer Society Publications . . . 407--b-407--b Anonymous The Information Edge . . . . . . . . . . 407--a-407--a Anonymous IEEE Computer Society . . . . . . . . . c2--c2 Anonymous \booktitleIEEE Transactions on Software Engineering --- Table of contents . . . c1--c1
C. Boksenbaum and M. Cart and J. Ferrie and J. F. Pons Concurrent Certifications by Intervals of Timestamps in Distributed Database Systems . . . . . . . . . . . . . . . . 409--419 F. Y. Chin and K. V. S. Ramarao An Information-Based Model for Failure-Handling in Distributed Database Systems . . . . . . . . . . . . . . . . 420--431 B. I. Blum A Paradigm for Developing Information Systems . . . . . . . . . . . . . . . . 432--439 R. T. Mittermeir and M. Oppitz Software Bases for the Flexible Composition of Application Systems . . . 440--460 K. Matsumura and H. Mizutani and M. Arai An Application of Structural Modeling to Software Requirements Analysis and Design . . . . . . . . . . . . . . . . . 461--471 V. Rajlich Refinement Methodology for Ada . . . . . 472--478 H. W. Robb and H. R. Weistroffer Performance Criteria for Constrained Nonlinear Programming Codes . . . . . . 479--489 F. G. Pagan Program Structure Charts for Applicative Languages . . . . . . . . . . . . . . . 490--493 B. Steinholtz and K. Walden Automatic Identification of Software System Differences . . . . . . . . . . . 493--497 Sun Zhongxiu and Li Xining CSM: A Distributed Programming Language 497--500 G. v. Bochmann and J. P. Verjus Some Comments on ``Transition-Oriented'' Versus ``Structured'' Specification of Distributed Algorithms and Protocols . . 501--505 Anonymous Call for papers . . . . . . . . . . . . 506--506 Anonymous In this issue . . . . . . . . . . . . . 506--506 Anonymous Beyond the Basics: A Software Publication Series for Successful Computer Professionals From the IEEE Computer Society . . . . . . . . . . . . 506--d-506--d Anonymous IEEE Computer Society Publications . . . 506--c-506--c Anonymous Membership Application . . . . . . . . . 506--b-506--b Anonymous IEEE Computer Society . . . . . . . . . c2--c2 Anonymous \booktitleIEEE Transactions on Software Engineering --- Table of contents . . . c1--c1
T. Chusho Test Data Selection and Quality Estimation Based on the Concept of Essential Branches for Path Testing . . 509--517 B. Sarikaya and G. v. Bochmann and E. Cerny A Test Design Methodology for Protocol Testing . . . . . . . . . . . . . . . . 518--531 Y. H. Kamath and M. M. Matthews Implementation of an FP-Shell . . . . . 532--539 S. Katz and O. Shmueli Cooperative Distributed Algorithms for Dynamic Cycle Prevention . . . . . . . . 540--552 J. C. Knight and J. I. A. Urquhart On the Implementation and Use of Ada on Fault-Tolerant Distributed Systems . . . 553--563 Wei Zhao and K. Ramamritham and J. A. Stankovic Scheduling Tasks with Resource Requirements in Hard Real-Time Systems 564--577 J. Magott New NP-Complete Problems in Performance Evaluation of Concurrent Systems Using Petri Nets . . . . . . . . . . . . . . . 578--581 R. K. Scott and J. W. Gault and D. F. McAllister Fault-Tolerant Software Reliability Modeling . . . . . . . . . . . . . . . . 582--592 R. N. Mathur Methodology for Business System Development . . . . . . . . . . . . . . 593--601 S. Masuyama and T. Ibaraki and S. Nishio and T. Hasegawa Shortest Semijoin Schedule for a Local Area Distributed Database System . . . . 602--606 Anonymous In this issue . . . . . . . . . . . . . 607--607 Anonymous Beyond the Basics: A Software Publication Series for Successful Computer Professionals From the IEEE Computer Society . . . . . . . . . . . . 607--c-607--c Anonymous IEEE Computer Society Publications . . . 607--b-607--b Anonymous The Information Edge . . . . . . . . . . 607--a-607--a Anonymous IEEE Computer Society . . . . . . . . . c2--c2 Anonymous \booktitleIEEE Transactions on Software Engineering --- Table of contents . . . c1--c1
S. P. Reiss Automatic Compiler Production: The Front End . . . . . . . . . . . . . . . . . . 609--627 K. Felgentreu and W. M. Lippe and F. H. Simon Optimizing Static Scope Lisp by Repetitive Interpretation of Recursive Function Calls . . . . . . . . . . . . . 628--635 F. W. Burton and D. Maurer and H. G. Oberhauser and R. Wilhelm A Space-Efficient Optimization of Call-by-Need . . . . . . . . . . . . . . 636--642 S. K. Das and V. K. Agrawal and D. Sarkar and L. M. Patnaik and P. S. Goel Reflexive Incidence Matrx (RIM) Representation of Petri Nets . . . . . . 643--653 R. L. Bagrodia and K. M. Chandy and J. Misra A Message-Based Approach to Discrete-Event Simulation . . . . . . . 654--665 R. D. Schultz and A. F. Cardenas An Approach and Mechanism for Auditable and Testable Advanced Transaction Processing Systems . . . . . . . . . . . 666--676 R. P. Roe and J. H. Rowland Some Theory Concerning Certification of Mathematical Subroutines by Black Box Testing . . . . . . . . . . . . . . . . 677--682 G. J. Holzmann Automated Protocol Validation in Argos: Assertion Proving and Scatter Searching 683--696 H. F. Li and W. K. Cheung An Empirical Study of Software Metrics 697--708 S. B. Yao and A. R. Hevner and H. Young-Myers Analysis of Database System Architectures Using Benchmarks . . . . . 709--725 Chuan-Qi Zhu and Pen-Chung Yew A Scheme to Enforce Data Dependence on Large Multiprocessor Systems . . . . . . 726--739 S. Purushothaman and P. A. Subrahmanyam Reasoning About Probabilistic Behavior in Concurrent Systems . . . . . . . . . 740--745 M. J. Carey Improving the Performance of an Optimistic Concurrency Control Algorithm Through Timestamps and Versions . . . . 746--751 M. Chellappa Nontraversible Paths in a Program . . . 751--756 J. Y. Le Boudec Interinput and Interoutput Time Distribution in Classical Product-Form Networks . . . . . . . . . . . . . . . . 756--759 K. V. S. Ramarao Comments on ``Detection of Mutual Inconsistency in Distributed Systems'' 759--760 Anonymous Information for authors . . . . . . . . 760--760 Anonymous IEEE Computer Society Publications . . . 760--a-760--a Anonymous IEEE Computer Society . . . . . . . . . c2--c2 Anonymous \booktitleIEEE Transactions on Software Engineering --- Table of contents . . . c1--c1
R. E. Prather and J. P. Myers The Path Prefix Software Testing Strategy . . . . . . . . . . . . . . . . 761--766 N. M. Bengtson Measuring Errors in Operational Analysis Assumptions . . . . . . . . . . . . . . 767--776 J. C. Cherniavsky and C. H. Smith A Recursion Theoretic Approach to Program Testing . . . . . . . . . . . . 777--784 A. Motro Superviews: Virtual Integration of Multiple Databases . . . . . . . . . . . 785--798 W. De Jonge and A. S. Tanenbaum and R. P. Van De Riet Two Access Methods Using Compact Binary Trees . . . . . . . . . . . . . . . . . 799--810 S. Jajodia and F. N. Springsteel Construction of Universal Instances for Loop-Free Network Databases Using a Join-Like Operation . . . . . . . . . . 811--819 J. D. Gannon and R. G. Hamlet and H. D. Mills Theory of Modules . . . . . . . . . . . 820--829 P. Freeman A Conceptual Analysis of the Draco Approach to Constructing Software Systems . . . . . . . . . . . . . . . . 830--844 D. N. Card and F. E. Mc Garry and G. T. Page Evaluating Software Engineering Technologies . . . . . . . . . . . . . . 845--851 D. R. Jeffery Time-Sensitive Cost Models in the Commercial MIS Environment . . . . . . . 852--859 S. M. Deen and R. R. Amin and M. C. Taylor Data Integration in Distributed Databases . . . . . . . . . . . . . . . 860--864 C. M. Davidson A Note on Concurrent Programming Control 865--866 Anonymous In this issue . . . . . . . . . . . . . 867--867 Anonymous The One Leveraged Investment With a Guaranteed Return . . . . . . . . . . . 867--867--a Anonymous IEEE Computer Society Publications . . . 867--b-867--b Anonymous IEEE Computer Society . . . . . . . . . c2--c2 Anonymous \booktitleIEEE Transactions on Software Engineering --- Table of contents . . . c1--c1
S. Jajodia and S. K. Tripathy Foreword . . . . . . . . . . . . . . . . 869--870 Anonymous List of referees . . . . . . . . . . . . 871--871 S. K. Tripathi and Yennun Huang and S. Jajodia Local Area Networks: Software and Related Issues . . . . . . . . . . . . . 872--879 B. N. Bershad and D. T. Ching and E. D. Lazowska and J. Sanislo and M. Schwartz A Remote Procedure Call Facility for Interconnecting Heterogeneous Computer Systems . . . . . . . . . . . . . . . . 880--894 R. C. Summers A Resource Sharing System for Personal Computers in a LAN: Concepts, Design, and Experience . . . . . . . . . . . . . 895--904 R. Agrawal and A. K. Ezzat Location Independent Remote Execution in NEST . . . . . . . . . . . . . . . . . . 905--912 J. Nehmer and D. Haban and F. Mattern and D. Wybranietz and H. D. Rombach Key Concepts of the INCAS Multicomputer Project . . . . . . . . . . . . . . . . 913--923 P. Jain and S. S. Lam Modeling and Verification of Real-Time Protocols for Broadcast Networks . . . . 924--937 Wei Zhao and K. Ramamritham Virtual Time CSMA Protocols for Hard Real-Time Communication . . . . . . . . 938--952 D. J. De Witt and R. Finkel and M. Solomon The Crystal Multicomputer: Design and Implementation Experience . . . . . . . 953--966 S. Ramesh and S. L. Mehndiratta A Methodology for Developing Distributed Programs . . . . . . . . . . . . . . . . 967--976 Je-Hao Wang and Tak-Sun Yuen and D. H. C. Du On Multiple Random Accesses and Physical Data Placement in Dynamic Files . . . . 977--987 Anonymous In this issue . . . . . . . . . . . . . 987--987 Anonymous Beyond The Basics: A Software Publication Series for Successful Computer Professionals From the IEEE Computer Society . . . . . . . . . . . . 987--a-987--a Anonymous IEEE Computer Society Publications . . . 987--b-987--b Anonymous IEEE Computer Society . . . . . . . . . c2--c2 Anonymous \booktitleIEEE Transactions on Software Engineering --- Table of contents . . . c1--c1
G. v. Bochmann and G. W. Gerber and J. M. Serre Semiautomatic Implementation of Communication Protocols . . . . . . . . 989--1000 G. T. Almes and C. L. Holman Edmas: An Object-Oriented, Locally Distributed Mail System . . . . . . . . 1001--1009 V. Gurbaxani and H. Mendelson Software and Hardware in Data Processing Budgets . . . . . . . . . . . . . . . . 1010--1017 Y. Y. Sung Performance Analysis of Disk Modulo Allocation Method for Cartesian Product Files . . . . . . . . . . . . . . . . . 1018--1026 R. W. Selby and V. R. Basili and F. T. Baker Cleanroom Software Development: An Empirical Evaluation . . . . . . . . . . 1027--1037 Y. Shi and N. Prywes and B. Szymanski and A. Pnueli Very High Level Concurrent Programming 1038--1046 S. Jajodia An Extension of ``Representative Instances and $ \gamma $-Acyclic Relational Schemes'' . . . . . . . . . . 1047--1048 Anonymous The Computer Society . . . . . . . . . . 1048--b-1048--b Anonymous IEEE Computer Society Publications . . . 1048--a-1048--a Anonymous IEEE Computer Society . . . . . . . . . c2--c2 Anonymous \booktitleIEEE Transactions on Software Engineering --- Table of contents . . . c1--c1
T. T. Lee An Information-Theoretic Analysis of Relational Databases --- Part I: Data Dependencies and Information Metric . . 1049--1061 T. T. Lee An Information-Theoretic Analysis of Relational Databases --- Part II: Information Structures of Database Schemas . . . . . . . . . . . . . . . . 1062--1072 A. A. Farrag and M. T. Ozsu Towards a General Concurrency Control Algorithm for Database Systems . . . . . 1073--1079 E. T. Morgan and R. R. Razouk Interactive State-Space Analysis of Concurrent Systems . . . . . . . . . . . 1080--1091 H. K. Jain A Comprehensive Model for the Design of Distributed Computer Systems . . . . . . 1092--1104 R. A. Sahner and K. S. Trivedi Performance and Reliability Analysis Using Directed Acyclic Graphs . . . . . 1105--1114 K. Rea and R. De B. Johnston Automated Analysis of Discrete Communication Behavior . . . . . . . . . 1115--1126 K. M. Kavi and B. P. Buckles and U. N. Bhat Isomorphisms Between Petri Nets and Dataflow Graphs . . . . . . . . . . . . 1127--1134 S. Mourad and D. Andrews On the Reliability of the IBM MVS/XA Operating System . . . . . . . . . . . . 1135--1139 Anonymous Beyond The Basics: A Software Publication Series for Successful Computer Professionals From the IEEE Computer Society . . . . . . . . . . . . 1139--a-1139--a Anonymous The Computer Society . . . . . . . . . . 1139--c-1139--c Anonymous IEEE Computer Society Publications . . . 1139--b-1139--b Anonymous IEEE Computer Society . . . . . . . . . c2--c2 Anonymous \booktitleIEEE Transactions on Software Engineering --- Table of contents . . . c1--c1
R. E. Fairley Guest Editor's Introduction . . . . . . 1141--1142 P. Freeman Essential Elements of Software Engineering Education Revisited . . . . 1143--1148 M. A. Ardis The Evolution of Wang Institute's Master of Software Engineering Program . . . . 1149--1155 D. M. Weiss Teaching a Software Design Methodology 1156--1163 J. L. Bentley and J. A. Dallen Exercises in Software Design . . . . . . 1164--1169 J. E. Burns and E. L. Robertson Two Complementary Course Sequences on the Design and Implementation of Software Products . . . . . . . . . . . 1170--1175 D. B. Wortman Software Projects in an Academic Environment . . . . . . . . . . . . . . 1176--1181 W. M. Mc Keeman Experience with a Software Engineering Project Course . . . . . . . . . . . . . 1182--1192 L. M. Leventhal and B. T. Mynatt Components of Typical Undergraduate Software Engineering Courses: Results from a Survey . . . . . . . . . . . . . 1193--1198 W. E. Riddle and L. G. Williams Technology Selection: An Educational Approach . . . . . . . . . . . . . . . . 1199--1206 J. Z. Lavi and M. I. B. Porat and A. Ben-David IAI Corporate Software Engineering Training and Education Program . . . . . 1207--1216 Anonymous The Computer Society . . . . . . . . . . 1216--b-1216--b Anonymous IEEE Computer Society Publications . . . 1216--a-1216--a Anonymous IEEE Computer Society . . . . . . . . . c2--c2 Anonymous \booktitleIEEE Transactions on Software Engineering --- Table of contents . . . c1--c1
Anonymous Editorial . . . . . . . . . . . . . . . 1217--1217 S. Aggarwal and D. Barbara and K. Z. Meth Spanner: A Tool for the Specification, Analysis, and Evaluation of Protocols 1218--1237 Pei-Jyun Leu and B. Bhargava Multidimensional Timestamp Protocols for Concurrency Control . . . . . . . . . . 1238--1253 R. Hayes and R. D. Schlichting Facilitating Mixed Language Programming in Distributed Systems . . . . . . . . . 1254--1264 V. Milutinovic A Simulation Study of the Vertical-Migration Microprocessor Architecture . . . . . . . . . . . . . . 1265--1277 V. R. Basili and R. W. Selby Comparing the Effectiveness of Software Testing Strategies . . . . . . . . . . . 1278--1296 M. A. Holliday and M. K. Vernon A Generalized Timed Petri Net Model for Performance Analysis . . . . . . . . . . 1297--1310 K. H. Pun and G. G. Belford Performance Study of Two Phase Locking in Single-Site Database Systems . . . . 1311--1328 Y. H. Chin and Weng-Ling Peng An Evaluation of Two New Inference Control Methods . . . . . . . . . . . . 1329--1339 S. Biswas and V. Rajaraman An Algorithm to Decide Feasibility of Linear Integer Constraints Occurring in Decision Tables . . . . . . . . . . . . 1340--1347 R. Agrawal and M. J. Carey and L. W. Mcvoy The Performance of Alternative Strategies for Dealing with Deadlocks in Database Management Systems . . . . . . 1348--1363 N. Y. Foo Algebraic Specifications as Solutions of Implementation Equations . . . . . . . . 1364--1369 H. K. N. Leung and H. K. Reghbati Comments on Program Slicing . . . . . . 1370--1371 Anonymous In this issue . . . . . . . . . . . . . 1371--1371 Anonymous 1987 Index \booktitleIEEE Transactions on Software Engineering Vol. SE-13 . . . 1371--1371 Anonymous The Computer Society . . . . . . . . . . 1371--k-1371--k Anonymous IEEE Computer Society Publications . . . 1371--j-1371--j Anonymous IEEE Computer Society . . . . . . . . . c2--c2 Anonymous \booktitleIEEE Transactions on Software Engineering --- Table of contents . . . c1--c1
C. R. Symons Function point analysis: difficulties and improvements . . . . . . . . . . . . 2--11 R. G. Dromey Systematic program development . . . . . 12--29 F. Panzieri and S. K. Shrivastava Rajdoot: a remote procedure call mechanism supporting orphan detection and killing . . . . . . . . . . . . . . 30--37 L. F. Cabrera and E. Hunter and M. J. Karels and D. A. Hosher User-process communication performance in networks of computers . . . . . . . . 38--53 V. M. Milutinovic and J. J. Crnkovic and C. E. Houstis A simulation study of two distributed task allocation procedures . . . . . . . 54--61 I. F. Akyildiz On the exact and approximate throughput analysis of closed queuing networks with blocking . . . . . . . . . . . . . . . . 62--70 M. A. Ketabchi and V. Berzins Mathemtical model of composite objects and its application for organizing engineering databases . . . . . . . . . 71--84 N. H. Madhavji Fragtypes: a basis for programming environments . . . . . . . . . . . . . . 85--97 D. P. Sidhu and C. S. Crall Executable logic specifications for protocol service interfaces . . . . . . 98--112 P. J. Leu and B. Bhargava Clarification of two phase locking in concurrent transaction processing . . . 122--125 J. Bradley A group-select operation for relational algebra and implications for database machine design . . . . . . . . . . . . . 126--129
M. H. Eich Graph directed locking . . . . . . . . . 133--140 T. L. Casavant and J. G. Kuhl A taxonomy of scheduling in general-purpose distributed computing systems . . . . . . . . . . . . . . . . 141--154 J. Kent and H. Garcia-Molina Optimizing shadow recovery algorithms 155--168 M. Adler An algebra for data flow diagram process decomposition . . . . . . . . . . . . . 169--183 T. T. Lee and M. Y. Lai A relational algebraic approach to protocol verification . . . . . . . . . 184--193 J. Karimi and B. R. Konsynski An automated software design assistant 194--210 V. Dhar and M. Jarke Dependence directed reasoning and learning in systems maintenance support 211--227 A. I. Concepcion and B. P. Zeigler DEVS formalism: a framework for hierarchical model development . . . . . 228--241 J. Choobineh and M. V. Mannino and J. F. Nunamaker and B. R. Konsynski An expert database design system based on analysis of forms . . . . . . . . . . 242--253 C. T. Baker Effects of field service on software reliability . . . . . . . . . . . . . . 254--258 R. C. B. Cooper and K. G. Hamilton Preserving abstraction in concurrent programming . . . . . . . . . . . . . . 258--263 D. Gray The formal specification of a small bookshop information system . . . . . . 263--272 V. Ambriola and D. Notkin Reasoning about interactive system . . . 272--276
S. Aggarwal and D. Barbara and K. Z. Meth A software environment for the specification and analysis of problems of coordination and concurrency . . . . 280--290 D. P. Anderson Automated protocol implementation with RTAG . . . . . . . . . . . . . . . . . . 291--300 J. Billington and G. R. Wheeler and M. C. Wilbur-Ham PROTEAN: a high-level Petri net tool for the specification and verification of communication protocols . . . . . . . . 301--316 E. J. Cameron and D. M. Cohen and B. Gopinath and W. M. Keese and L. Ness and P. Uppaluru and J. R. Vollaro The IC* model of parallel computation and programming environment . . . . . . 317--326 C. H. Chow and S. S. Lam PROSPEC: an interactive programming environment for designing and verifying communication protocols . . . . . . . . 327--338 C. Jard and J. F. Monin and R. Groz Development of Veda, a prototyping tool for distributed algorithms . . . . . . . 339--352 S. S. Lam Protocol conversion . . . . . . . . . . 353--362 R. S. Matthews and K. H. Muralidhar and S. Sparks MAP 2.1 conformance testing tools . . . 363--374 S. Sevinc and B. P. Zeigler Entity structure based design methodology: a LAN protocol example . . 375--383 S. T. Vuong and A. C. Lau and R. I. Chan Semiautomatic implementation of protocols using an Estelle-C compiler 384--393 Y. X. Zhang and K. Takahashi and N. Shiratori and S. Noguchi An interactive protocol synthesis algorithm using a global state transition graph . . . . . . . . . . . . 394--404
S. S. Yau and W. Hong Verification of concurrent control flow in distributed computer systems . . . . 405--417 I. F. Akyildiz Mean value analysis for blocking queueing networks . . . . . . . . . . . 418--428 K. R. Dittrich and R. A. Lorie Version support for engineering database systems . . . . . . . . . . . . . . . . 429--437 H. Alexander Comments on ``Formal specification of user interfaces: a comparison and evaluation of four axiomatic approaches'' by U. H. Chi . . . . . . . 438--439 W. Cellary and Z. Krolikowski and T. Morzy Other comments on ``Optimization algorithms for distributed queries'' by P. M. G. Apers . . . . . . . . . . . . . 439--441 B. G. Ryder and J. S. Pendergrast Experiments in optimizing FP . . . . . . 444--454 K. Schwan and R. Ramnath and S. Vasudevan and D. Ogle A language and system for the construction and tuning of parallel programs . . . . . . . . . . . . . . . . 455--471 B. Jayaraman Semantics of EqL . . . . . . . . . . . . 472--480 T. Murata and D. Zhang A predicate-transition net model for parallel interpretation of logic programs . . . . . . . . . . . . . . . . 481--497 T. Rus Parsing languages by pattern matching 498--511 A. L. Wolf and L. A. Clarke and J. C. Wileden A model of visibility control . . . . . 512--520 Anonymous Foreword . . . . . . . . . . . . . . . . 521--521 P. Heidelberger and M. S. Lakshmi A performance comparison of multimicro and mainframe database architectures . . 522--531 R. Nelson and D. Towsley and A. N. Tantawi Performance analysis of parallel processing systems . . . . . . . . . . . 532--540 D. A. Reed and A. D. Malony and B. D. McCredie Parallel discrete event simulation using shared memory . . . . . . . . . . . . . 541--553
W. Damm A microprogramming logic . . . . . . . . 559--574 R. A. Mueller and M. R. Duda and P. H. Sweany and J. S. Walicki Horizon: a retargetable compiler for horizontal microarchitectures . . . . . 575--583 A. Aiken and A. Nicolau A development environment for horizontal microcode . . . . . . . . . . . . . . . 584--594 V. H. Allan and R. A. Mueller Compaction with general synchronous timing . . . . . . . . . . . . . . . . . 595--599 R. I. Winner Naming and binding in a vertical migration environment . . . . . . . . . 599--607 J. A. Orenstein and F. A. Manola PROBE spatial data modeling and query processing in an image database application . . . . . . . . . . . . . . 611--629 T. Joseph and A. F. Cardenas PICQUERY: a high level query language for pictorial database management . . . 630--638 N. Roussopoulos and C. Faloutsos and T. Sellis An efficient pictorial database system for PSQL . . . . . . . . . . . . . . . . 639--650 Y. Cheng and S. S. Iyengara and R. L. Kashyap A new method of image compression using irreducible covers of maximal rectangles 651--658 A. Unnikrishnan and P. Shankar and Y. V. Venkatesh Threaded linear hierarchical quadtrees for computation of geometric properties of binary images . . . . . . . . . . . . 659--665 M. Tanaka and T. Ichikawa A visual user interface for map information retrieval based on semantic significance . . . . . . . . . . . . . . 666--670 R. Kasturi and J. Alemany Information extraction from images of paper-based maps . . . . . . . . . . . . 671--675 L. Mohan and R. L. Kashyap An object-oriented knowledge representation for spatial information 675--681 S. K. Chang and C. W. Yan and D. C. Dimitroff and T. Arndt An intelligent image database system . . 681--688
M. Young and R. N. Taylor and D. B. Troup Software environment architectures and user interface facilities . . . . . . . 697--708 S. E. Hudson and R. King The Cactis project: database support for software environments . . . . . . . . . 709--719 A. Van Lamsweerde and B. Delcourt and E. Delor and M. C. Schayes and R. Champagne Generic lifecycle support in the ALMA environment . . . . . . . . . . . . . . 720--741 P. A. Oberndorf The Common Ada Programming Support Environment (APSE) Interface Set (CAIS) 742--748 J. Ramanthan and S. Sarkar Providing customized assistance for software lifecycle approaches . . . . . 749--757 V. R. Basili and H. D. Rombach The TAME project: towards improvement-oriented software environments . . . . . . . . . . . . . . 758--773 G. Fisher An overview of a graphical multilanguage applications environment . . . . . . . . 774--786 A. Giacalone and S. A. Smolka Integrated environments for formally well-founded design and simulation of concurrent systems . . . . . . . . . . . 787--802 R. M. Herndon and V. A. Berzins The realizable benefits of a language prototyping language . . . . . . . . . . 803--809 K. H. Kim Programmer-transparent coordination of recovering concurrent processes: philosophy and rules for efficient implementation . . . . . . . . . . . . . 810--821 B. Meandzija Archetype: a unified method for the design and implementation of protocol architectures . . . . . . . . . . . . . 822--837 Krishna P. Mikkilineni and Stanley Y. W. Su An Evaluation of Relational Join Algorithms in a Pipelined Query Processing Environment . . . . . . . . . 838--848 T. G. Moher PROVIDE: a process visualization and debugging environment . . . . . . . . . 849--857 A. Moitra and S. S. Iyengar and F. B. Bastani and I. L. Yen Multilevel data structures: models and performance . . . . . . . . . . . . . . 858--867 S. C. Ntafos A comparison of some structural testing strategies . . . . . . . . . . . . . . . 868--874
R. Agrawal Alpha: an extension of relational algebra to express a class of recursive queries . . . . . . . . . . . . . . . . 879--885 H. Garcia-Molina and B. Kogan Achieving high availability in distributed databases . . . . . . . . . 886--896 M. Stonebraker and E. N. Hanson and S. Potamianos The POSTGRES rule manager . . . . . . . 897--907 B. C. Jenq and W. H. Kohler and D. Towsley A queueing network model for a distributed database testbed system . . 908--921 M. Kifer and E. L. Lozinskii SYGRAF: implementing logic programs in a database style . . . . . . . . . . . . . 922--935 C. Pu and J. D. Noe and A. Proudfoot Regeneration of replicated objects: a technique and its Eden implementation 936--945 S. A. Demurjian and D. K. Hsiao Towards a better understanding of data models through the multilingual database system . . . . . . . . . . . . . . . . . 946--958 M. Kao and N. Cercone and W. S. Luk Providing quality responses with natural language interfaces: the null value problem . . . . . . . . . . . . . . . . 959--984 W. Kim and H. T. Chou and J. Banerjee Operations and implementation of complex objects . . . . . . . . . . . . . . . . 985--996 T. Ibaraki and T. Kameda and N. Katoh Cautious transaction schedulers for database concurrency control . . . . . . 997--1009 H. Lam and S. Y. W. Su and N. R. Koganti A physical database design evaluation system for CODASYL databases . . . . . . 1010--1022 J. Stelovsky and H. Sugaya A system for specification and rapid prototyping of application command languages . . . . . . . . . . . . . . . 1023--1032 N. C. Rowe Absolute bounds on set intersection and union sizes from distribution information . . . . . . . . . . . . . . 1033--1048 K. Siegrist Reliability of systems with Markov transfer of control . . . . . . . . . . 1049--1053
Y. Kakuda and Y. Wakahara and M. Norigoe An acyclic expansion algorithm for fast protocol validation . . . . . . . . . . 1059--1070 M. A. Bassiouni Single-site and distributed optimistic protocols for concurrency control . . . 1071--1080 K. C. Kinsley and C. E. Hughes Evaluating database update schemes: a methodology and its applications to distributive systems . . . . . . . . . . 1081--1089 Y. Wang A distributed specification model and its prototyping . . . . . . . . . . . . 1090--1097 T. Tenma and H. Tsubotani and M. Tanaka and T. Ichikawa A system for generating language-oriented editors . . . . . . . 1098--1109 M. Edel The Tinkertoy graphical programming environment . . . . . . . . . . . . . . 1110--1115 B. Ramamurthy and A. Melton A synthesis of software science measures and the cyclomatic number . . . . . . . 1116--1121 S. M. Shatz Towards complexity metrics for Ada tasking . . . . . . . . . . . . . . . . 1122--1127 S. S. Yau and R. A. Nicholl and J. J. P. Tsai and S. S. Liu An integrated life-cycle model for software maintenance . . . . . . . . . . 1128--1144 C. V. Ramamoorthy and V. Garg and A. Prakash Support for reusability in Genesis . . . 1145--1154 C. F. Yu and B. W. Wah Learning dominance relations in combined search problems . . . . . . . . . . . . 1155--1175 S. J. Hartley An analysis of some problems in managing virtual memory systems with fast secondary storage devices . . . . . . . 1176--1187 S. E. Hudson and R. King Semantic feedback in the Higgens UIMS 1188--1206 R. C. Waters Program translation via abstraction and reimplementation . . . . . . . . . . . . 1207--1228 G. Von Bochmann Delay-independent design for distributed systems . . . . . . . . . . . . . . . . 1229--1237 Michael L. Scott and Raphael A. Finkel A simple mechanism for type security across compilation units . . . . . . . . 1238--1239
D. Hoffman and R. Snodgrass Trace specifications: methodology and models . . . . . . . . . . . . . . . . . 1243--1252 B. Korel PELAS-program error-locating assistant system . . . . . . . . . . . . . . . . . 1253--1260 T. J. Yu and V. Y. Shen and H. E. Dunsmore An analysis of several software defect models . . . . . . . . . . . . . . . . . 1261--1270 T. Tenny Program readability: procedures versus comments . . . . . . . . . . . . . . . . 1271--1279 L. Orman Functional development of database applications . . . . . . . . . . . . . . 1280--1292 P. Rullo and D. Sacca An automatic physical designer for network model databases . . . . . . . . 1293--1306 P. S. Yu and S. Balsamo and Y. H. Lee Dynamic transaction routing in distributed database systems . . . . . . 1307--1318 S. Pramanik and D. Vineyard Optimizing join queries in distributed databases . . . . . . . . . . . . . . . 1319--1326 S. Zhou A trace-driven simulation study of dynamic load balancing . . . . . . . . . 1327--1341 C. F. Yu and B. W. Wah Efficient branch-and-bound algorithms on a two-level memory system . . . . . . . 1342--1356 E. J. Weyuker Evaluating software complexity measures 1357--1365 J. S. Davis and R. J. LeBlanc A study of the applicability of complexity measures . . . . . . . . . . 1366--1372 J. T. Nosek and R. B. Schwartz User validation of information system requirements: some empirical results . . 1372--1375 S. S. Lam Correction to `Protocol conversion' . . 1376
Christos Faloutsos Gray codes for partial match and range queries . . . . . . . . . . . . . . . . 1381--1393 C. U. Smith Applying synthesis principles to create responsive software systems . . . . . . 1394--1408 Luqi and V. Berzins and R. Yeh A prototyping language for real-time software . . . . . . . . . . . . . . . . 1409--1423 J. L. W. Kessels PHILAN: a LAN providing a reliable message service for distributed processing . . . . . . . . . . . . . . . 1424--1431 F. B. Bastani and I. L. Yen and I. R. Chen A class of inherently fault tolerant distributed programs . . . . . . . . . . 1432--1442 A. K. Elmagarmid and N. Soundararajan and M. T. Liu A distributed deadlock detection and resolution algorithm and its correctness proof . . . . . . . . . . . . . . . . . 1443--1452 A. M. Davis and E. H. Bersoff and E. R. Comer A strategy for comparing alternative software development life cycle models 1453--1461 B. W. Boehm and P. N. Papaccio Understanding and controlling software costs . . . . . . . . . . . . . . . . . 1462--1477 K. Siegrist Reliability of systems with Markov transfer of control, II . . . . . . . . 1478--1480 C. M. Davidson Quicksort revisited . . . . . . . . . . 1480--1481 P. G. Frankl and E. J. Weyuker An applicable family of data flow testing criteria . . . . . . . . . . . . 1483--1498 M. Young and R. N. Taylor Combining static concurrency analysis with symbolic execution . . . . . . . . 1499--1511 S. N. Weiss and E. J. Weyuker An extended domain-based model of software reliability . . . . . . . . . . 1512--1524 A. J. Gordon and R. A. Finkel Handling timing errors in distributed programs . . . . . . . . . . . . . . . . 1525--1535
I. F. Akyildiz and A. Sieber Approximate analysis of load dependent general queueing networks . . . . . . . 1537--1545 N. H. Gehani and W. D. Roome Rendezvous facilities: Concurrent C and the Ada language . . . . . . . . . . . . 1546--1553 N. De Francesco and G. Vaglini Description for a tool specifying and prototyping concurrent programs . . . . 1554--1564 D. P. Sidhu and J. Aristizabal Constructing submodule specifications and network protocols . . . . . . . . . 1565--1577 T. L. Casavant and J. G. Kuhl Effects of response and stability on scheduling in distributed computing systems . . . . . . . . . . . . . . . . 1578--1588 C. U. Munoz An approach to software product testing 1589--1596 S. Ceri and S. Crespi-Reghizzi and A. Di Maio and L. A. Lavazza Software prototyping by relational techniques: experiences with program construction systems . . . . . . . . . . 1597--1609 G. Lausen Modeling and analysis of the behavior of information systems . . . . . . . . . . 1610--1620 A. Maggiolo-Schettini and M. Napoli and G. Tortora Web structures: a tool for representing and manipulating programs . . . . . . . 1621--1639 S. J. Hartley Compile-time program restructuring in multiprogrammed virtual memory systems 1640--1644 K. S. Lew and T. S. Dillon and K. E. Forward Software complexity and its impact on software reliability . . . . . . . . . . 1645--1655 K. P. Mikkilineni and Y. C. Chow and S. Y. W. Su Petri-net-based modeling and evaluation of pipelined processing of concurrent database queries . . . . . . . . . . . . 1656--1667 G. Z. Qadah and K. B. Irani The join algorithms on a shared-memory multiprocessor database machine . . . . 1668--1683 J. Banerjee and W. Kim and S. J. Kim and J. F. Garza Clustering a DAG for CAD databases . . . 1684--1699 D. Rotem and A. Segev Algorithms for multidimensional partitioning of static files . . . . . . 1700--1710 D. S. Batoory and J. R. Barnett and J. F. Garza and K. P. Smith and K. Tsukuda and B. C. Twichell and T. E. Wise GENESIS: an extensible database management system . . . . . . . . . . . 1711--1730 C. C. Yang and G. Li and P. A. B. Ng An improved algorithm based on subset closures for synthesizing a relational database scheme . . . . . . . . . . . . 1731--1738
R. W. Selby and A. A. Porter Learning from examples: generation and evaluation of decision trees for software resource analysis . . . . . . . 1743--1757 L. D. Erman and J. S. Lark and F. Hayes-Roth ABE: an environment for engineering intelligent systems . . . . . . . . . . 1758--1770 E. Schoen and R. G. Smith and B. G. Buchanan Design of knowledge-based systems with a knowledge-based assistant . . . . . . . 1771--1791 K. L. Clark PARLOG and its applications . . . . . . 1792--1804 J. Herath and Y. Yamaguchi and N. Saito and T. Yuba Dataflow computing models, languages, and machines for intelligence computations . . . . . . . . . . . . . . 1805--1828 D. I. Moldovan and C. I. Wu A hierarchical knowledge based system for airplane classification . . . . . . 1829--1834
D. C. Sarkar and S. C. De Sarkar Some inference rules for integer arithmetic for verification of flowchart programs on integers . . . . . . . . . . 1--9 A. N. Choudhary and W. H. Kohler and J. A. Stankovic and D. Towsley A modified priority based probe algorithm for distributed deadlock detection and resolution . . . . . . . . 10--17 Edward R. Omiecinski Heuristics for Join Processing Using Nonclustered Indexes . . . . . . . . . . 18--25 J. S. J. Chen and V. O. K. Li Optimizing joins in fragmented database systems on a broadcast local network . . 26--38 S. Jajodia and D. Mutchler A pessimistic consistency control algorithm for replicated files which achieves high availability . . . . . . . 39--46 T. Minoura and S. S. Iyengar Data and time abstraction techniques for analyzing multilevel concurrent systems 47--59 Chao-Chih Yang Deduction graphs: an algorithm and applications . . . . . . . . . . . . . . 60--67 P. Jalote Resilient objects in broadband networks 68--72 C. S. Hartzman The delay due to dynamic two-phase locking . . . . . . . . . . . . . . . . 72--82 M. Takahashi and Y. Kamayachi An empirical study of a model for program error prediction . . . . . . . . 82--86 K. J. Ottenstein A simplified framework for reduction in strength . . . . . . . . . . . . . . . . 86--92 D. Davcev A dynamic voting scheme in distributed systems . . . . . . . . . . . . . . . . 93--97
P. Armenise A structured approach to program optimization . . . . . . . . . . . . . . 101--108 T. K. Abdel-Hamid The dynamics of software project staffing: a system dynamics based simulation approach . . . . . . . . . . 109--119 K. K. Ramakrishnan and J. S. Emer Performance analysis of mass storage service alternatives for distributed systems . . . . . . . . . . . . . . . . 120--133 D. M. Nicol Optimal partitioning of random programs across two processors . . . . . . . . . 134--141 B. C. Desai Performance of a composite attribute and join index . . . . . . . . . . . . . . . 142--152 S. Ceri and G. Gottlob and G. Wiederhold Efficient database access from Prolog 153--164 F. L. Bauer and B. Moller and H. Partsch and P. Pepper Formal program construction by transformations-computer-aided, intuition-guided programming . . . . . . 165--180 J. M. Wing and M. R. Nixon Extending Ina Jo with temporal logic . . 181--197 M. S. Feather Constructing specifications by combining parallel elaborations . . . . . . . . . 198--208 G. Peterka and T. Murata Proof procedure and answer extraction in Petri net model of logic programs . . . 209--217 D. B. Brown and S. Maghsoodloo and W. H. Deason A cost model for determining the optimal number of software test cases . . . . . 218--221 D. B. Skillicorn and J. I. Glasgow Real-time specification using Lucid . . 221--229
R. J. A. Buhr and G. M. Karam and C. J. Hayes and C. M. Woodside Software CAD: a revolutionary approach 235--249 A. L. Wolf and L. A. Clarke and J. C. Wileden The AdaPIC tool set: supporting interface control and analysis throughout the software development process . . . . . . . . . . . . . . . . 250--263 P. Jalote Functional refinement and nested objects for object-oriented design . . . . . . . 264--270 R. Jha and J. M. Kamrad and D. T. Cornhill Ada program partitioning language: a notion for distributing Ada programs . . 271--280 R. A. Volz and T. N. Mudge and G. D. Buzzard and P. Krishnan Translation and execution of distributed Ada programs: Is it still Ada? . . . . . 281--292 A. F. Brindle and R. N. Taylor and D. F. Martin A debugger for Ada tasking . . . . . . . 293--304 M. B. Feldman and M. L. Moran Validating a demonstration tool for graphics-assisted debugging of Ada concurrent programs . . . . . . . . . . 305--313 T. Murata and B. Shenker and S. M. Shatz Detection of Ada static deadlocks using Petri net invariants . . . . . . . . . . 314--326 L. M. Ni and C. F. E. Wu Design tradeoffs for process scheduling in shared memory multiprocessor systems 327--334 R. F. Cmelik and N. H. Gehani and W. D. Roome Experience with multiple processor versions of Concurrent C . . . . . . . . 335--344 Y. Tohma and K. Tokunaga and S. Nagase and Y. Murata Structural approach to the estimation of the number of residual software faults based on the hyper-geometric distribution . . . . . . . . . . . . . . 345--355 A. Fuggetta and C. Ghezzi and D. Mandrioli Some consideration on real-time behavior of concurrent programs . . . . . . . . . 356--359 B. Sanden The case for electric design of real-time software . . . . . . . . . . . 360--362 P. A. Curritt and M. Dyer and H. D. Mills Correction to `Certifying the reliability of software' (Jan. 1986 3--11) . . . . . . . . . . . . . . . . . 362
G. Florin and S. Natkin Necessary and sufficient ergodicity condition for open synchronized queueing networks . . . . . . . . . . . . . . . . 367--380 P. J. Haas and G. S. Shedler Stochastic Petri net representation of discrete event simulations . . . . . . . 381--393 J. Bechta Dugan and G. Ciardo Stochastic Petri net analysis of a replicated file system . . . . . . . . . 394--401 N. F. Schneidewind Distributed system software design paradigm with application to computer networks . . . . . . . . . . . . . . . . 402--412 D. P. Sidhu and T. K. Leung Formal methods for protocol testing: a detailed study . . . . . . . . . . . . . 413--426 M. A. Linton and R. W. Quong A macroscopic profile of program compilation and linking . . . . . . . . 427--436 D. M. Dias and B. R. Iyer and J. T. Robinson and P. S. Yu Integrated concurrency-coherency controls for multisystem data sharing 437--448 J. A. Larson and S. B. Navathe and R. Elmasri A theory of attributed equivalence in databases with application to schema integration . . . . . . . . . . . . . . 449--463 A. U. Tansel and M. E. Arkun and G. Ozsoyoglu Time-by-example query language for historical databases . . . . . . . . . . 464--478 A. Dogac and B. Yuruten and S. Spaccapietra A generalized expert system for database design . . . . . . . . . . . . . . . . . 479--491 M. Ahamad and M. H. Ammar Performance characterization of quorum-consensus algorithms for replicated data . . . . . . . . . . . . 492--496 S. H. Zweben and J. S. Gourlay Comments, with reply, on ``Axiomatizing software test data adequacy'' by E. J. Weyuker . . . . . . . . . . . . . . . . 496--501
S. K. Chang and M. J. Tauber and B. Yu and J. S. Yu A visual language compiler . . . . . . . 506--525 P. Jalote Testing the completeness of specifications . . . . . . . . . . . . . 526--531 B. Hailpern and T. Huynh and G. Revesz Comparing two functional programming systems . . . . . . . . . . . . . . . . 532--542 W. H. Shaw and J. W. Howatt and R. S. Maness and D. M. Miller A software science model of compile time 543--549 H. D. Mills and V. R. Basili and J. D. Gannon and R. G. Hamlet Mathematical principles for a first course in software engineering . . . . . 550--559 R. T. Jacob and I. P. Page Synthesis of mutual exclusion solutions based on binary semaphores . . . . . . . 560--568 P. M. Lenders Distributed computing with single read-single write variables . . . . . . 569--574 W. S. Luk and F. Ling An analytic/empirical study of distributed sorting on a local area network . . . . . . . . . . . . . . . . 575--586 Z. Xu and K. Hwang Molecule: a language construct for layered development of parallel programs 587--599 S. P. Ghosh Numerical operations on a relational database . . . . . . . . . . . . . . . . 600--610 G. Barrett Formal methods applied to a floating-point number system . . . . . . 611--621 J. L. Baer and Y. B. Lin Improving quicksort performance with a codeword data structure . . . . . . . . 622--631 D. A. Varvel and L. Shapiro The computational completeness of extended database query languages . . . 632--638 K. B. Lakshmanan and K. Thulasiraman and M. A. Comeau An efficient distributed protocol for finding shortest paths in networks with negative weights . . . . . . . . . . . . 639--644 I. Cidon An efficient distributed knot detection algorithm . . . . . . . . . . . . . . . 644--649 R. K. Lind and K. Vairavan An experimental investigation of software metrics and their relationship to software development effort . . . . . 649--653 L. Ciminiera and A. Valenzano Authentication mechanisms in microprocessor-based local area networks 654--658 J. Wu and E. B. Fernandez A simplification of a conversation design scheme using Petri nets . . . . . 658--660
J. Magee and J. Kramer and M. Sloman Constructing distributed systems in Conic . . . . . . . . . . . . . . . . . 663--675 R. A. Finkel and M. L. Scott and Y. Artsy and H. Y. Chang Experience with Charlotte: simplicity and function in a distributed operating system . . . . . . . . . . . . . . . . . 676--685 A. R. Tripathi An overview of the Nexus distributed operating system design . . . . . . . . 686--695 M. Y. Lai and W. K. Wilkinson and V. Lanin On distributing JASMIN's optimistic multiversioning page manager . . . . . . 696--704 A. Kumar and M. Stonebraker Performance considerations for an operating system transaction manager . . 705--714 K. H. Kim An approach to experimental evaluation of real-time fault-tolerant distributed computing schemes . . . . . . . . . . . 715--725 B. Bhargava and J. Riedl The Raid distributed database system . . 726--736 S. J. Zeil Perturbation techniques for detecting domain errors . . . . . . . . . . . . . 737--746 C. L. Ramsey and V. R. Basili An evaluation of expert systems for software engineering management . . . . 747--759 C. C. Yang and J. J. Y. Chen and H. L. Chau Algorithms for constructing minimal deduction graphs . . . . . . . . . . . . 760--770 B. Jayaraman and G. Gupta EQL: the language and its implementation 771--779 C. T. Yu and K. C. Guh and D. Brill and A. L. P. Chen Partition strategy for distributed query processing in fast local networks . . . 780--793 Y. Manolopoulos and J. G. Kollias Expressions for completely and partly unsuccessful batched search of sequential and tree-structured files . . 794--799 R. O. Onvural and H. G. Perros Approximate throughput analysis of cyclic queueing networks with finite buffers . . . . . . . . . . . . . . . . 800--808 H. H. Ammar and S. M. R. Islam Time scale decomposition of a class of generalized stochastic Petri net models 809--820 C. May The parallel assignment problem redefined . . . . . . . . . . . . . . . 821--824
M. P. Herlihy and M. S. McKendry Timestamp-based orphan elimination . . . 825--831 M. Ajmone Marsan and G. Balbo and A. Bobbio and G. Chiola and G. Conte and A. Cumani The effect of execution policies on the semantics and analysis of stochastic Petri nets . . . . . . . . . . . . . . . 832--846 R. Gusella and S. Zatti The accuracy of the clock synchronization achieved by TEMPO in Berkeley UNIX 4.3BSD . . . . . . . . . . 847--853 J. L. Wolf and D. M. Dias and B. R. Iyer and P. S. Yu Multisystem coupling by a combination of data sharing and data partitioning . . . 854--860 B. Samadi TUNEX: a knowledge-based system for performance tuning of the UNIX operating system . . . . . . . . . . . . . . . . . 861--874 A. C. Shaw Reasoning about time in higher-level language software . . . . . . . . . . . 875--889 B. Lazzerini and L. Lopriore Abstraction mechanisms for event control in program debugging . . . . . . . . . . 890--901 B. W. Boehm and R. Ross Theory-W software project management principles and examples . . . . . . . . 902--916 L. M. Wegner and J. I. Teuhola The external Heapsort . . . . . . . . . 917--925 Liu Lingzhong Comments on ``A distributed scheme for detecting communication deadlocks'' by N. Natarajan . . . . . . . . . . . . . . 926 B. Sanden Correction to `The case for electric design of real-time software' . . . . . 926
Guang-Huei Chiou and Wen-Tsuen Chen Secure broadcasting using the secure lock . . . . . . . . . . . . . . . . . . 929--934 S. P. Hufnagel and J. C. Browne Performance properties of vertically partitioned object-oriented systems . . 935--946 M. L. Fontenot Software congestion, mobile servers, and the hyperbolic model . . . . . . . . . . 947--962 S. K. Chen and W. T. Tsai and M. B. Thuraisingham Recovery point selection on a reverse binary tree task model . . . . . . . . . 963--976 R. K. Shyamasundar and J. W. Thatcher Language constructs for specifying concurrency in CDL . . . . . . . . . . . 977--993 U. Halici and A. Dogac Concurrency control in distributed databases through time intervals and short-term locks . . . . . . . . . . . . 994--1003 D. W. Cornell and P. S. Yu On optimal site assignment for relations in the distributed database environment 1004--1009 J. I. Aoe An efficient implementation of static string pattern matching machines . . . . 1010--1016 A. Kusiak Expert systems and optimization . . . . 1017--1020
C. Y. Lin and R. R. Levary Computer-aided software development process design . . . . . . . . . . . . . 1025--1037 G. Ozsoyoglu and H. Wang A relational calculus with set operators, its safety, and equivalent graphical languages . . . . . . . . . . 1038--1052 R. Bagrodia Process synchronization: design and performance evaluation of distributed algorithms . . . . . . . . . . . . . . . 1053--1065 J. I. Aoe An efficient digital search algorithm by using a double-array structure . . . . . 1066--1077 J. Etkin and J. A. Zinky Development life cycle of computer networks: the executable model approach 1078--1089 S. A. Mamrak and M. S. Kaelbling and C. K. Nicholas and M. Share Chameleon: a system for solving the data-translation problem . . . . . . . . 1090--1108 D. J. Troy and C. T. Yu and W. Zhang Linearization of nonlinear recursive rules . . . . . . . . . . . . . . . . . 1109--1119 A. Malhotra and H. M. Markowitz and Y. Tsalalikhin and D. P. Pazel and L. M. Burns An entity-relationship programming language . . . . . . . . . . . . . . . . 1120--1130 J. A. Lehman An empirical comparison of textual and graphical data structure documentation for Cobol programs . . . . . . . . . . . 1131--1135 Chi-Sung Laih and Lein Harn and Jau-Yien Lee On the design of a single-key-lock mechanism based on Newton's interpolating polynomial . . . . . . . . 1135--1137
K. Sugihara and T. Kikuno and N. Yoshida A Meeting Scheduler for Office Automation . . . . . . . . . . . . . . . 1141--1146 A. Thomasian and In Kyung Ryu A Recursive Solution Method to Analyze the Performance of Static Locking Systems . . . . . . . . . . . . . . . . 1147--1156 Sang Hyuk Son and A. K. Agrawala Distributed Checkpointing for Globally Consistent States of Databases . . . . . 1157--1167 Xian-he Sun and N. N. Kamel and L. M. Ni Processing Implication on Queries . . . 1168--1175 C. H. Kung Conceptual Modeling in the Context of Development . . . . . . . . . . . . . . 1176--1187 Kang G. Shin and C. M. Krishna and Yann-hang Lee Optimal Dynamic Control of Resources in a Distributed System . . . . . . . . . . 1188--1198 R. D. Banker and C. F. Kemerer Scale Economies in New Software Development . . . . . . . . . . . . . . 1199--1205 S. Balsamo and L. Donatiello On the Cycle Time Distribution in a Two-Stage Cyclic Network with Blocking 1206--1216 P. Ciaccia and M. R. Scalas Optimization Strategies for Relational Queries . . . . . . . . . . . . . . . . 1217--1235 M. Ruschitzka Heterogeneous Data Translations Based on Environment Grammars . . . . . . . . . . 1236--1251 Wei-Chung Hsu and C. N. Fischer and J. R. Goodman On the Minimization of Loads/Stores in Local Register Allocation . . . . . . . 1252--1260 H. Chetto and M. Chetto Some Results of the Earliest Deadline Scheduling Algorithm . . . . . . . . . . 1261--1269 V. R. Iyer and H. A. Sholl Sofiware Partitioning for Distributed, Sequential, Pipelined Applications . . . 1270--1279 Lung-chun Liu and E. Horowitz A Formal Model for Software Project Management . . . . . . . . . . . . . . . 1280--1293 D. B. Bisant and J. R. Lyle A Two-Person Inspection Method to Improve Prog ramming Productivity . . . 1294--1304 I. F. Akyildiz and H. Von Brand Central Server Models with Multiple Job Classes, State Dependent Routing, and Rejection Blocking . . . . . . . . . . . 1305--1312
L. A. Clarke and A. Podgurski and D. J. Richardson and S. J. Zeil A formal evaluation of data flow path selection criteria . . . . . . . . . . . 1318--1332 K. Shannon and R. Snodgrass Mapping the Interface Description Language type model into C . . . . . . . 1333--1346 G. V. Bochmann and R. Dssouli and J. R. Zhao Trace analysis for conformance and arbitration testing . . . . . . . . . . 1347--1356 J. P. Gupta and S. C. Winter and D. R. Wilson CTDNet --- a mechanism for the concurrent execution of lambda graphs 1357--1367 D. Sarkar and S. C. De Sarkar A set of inference rules for quantified formula handling and array handling in verification of programs over integers 1368--1381 W. R. Bevier Kit: a study in operating system verification . . . . . . . . . . . . . . 1382--1396 H. Ossher A case study in structure specification: a grid description of Scribe . . . . . . 1397--1416 M. Evangelist and N. Francez and S. Katz Multiparty interactions for interprocess communication and synchronization . . . 1417--1426 D. Fernandez-Baca Allocating modules to processors in a distributed system . . . . . . . . . . . 1427--1436 T. H. Merrett and N. Laliberte Including scalars in a programming language based on the relational algebra 1437--1443 M. M. Theimer and K. A. Lantz Finding idle machines in a workstation-based distributed system . . 1444--1458 A. Hac A distributed algorithm for performance improvement through file replication, file migration, and process migration 1459--1470 G. M. Karam and C. M. Stanczyk and G. W. Bond Critical races in Ada programs . . . . . 1471--1480 S. S. Brilliant and J. C. Knight and N. G. Leveson The consistent comparison problem in $N$-version software . . . . . . . . . . 1481--1485 H. Joe Statistical inference for general-order-statistics and nonhomogeneous-Poisson-process software reliability models . . . . . . . . . . . 1485--1490 A. Chung and D. P. Sidhu On conditions for defining a closed cover to verify progress for communicating finite state machines . . 1491--1494
M. L. Dertouzos and A. K. Mok Multiprocessor online scheduling of hard-real-time tasks . . . . . . . . . . 1497--1506 N. R. Howes and A. C. Weaver Measurements of Ada overhead in OSI-style communications systems . . . . 1507--1517 R. S. Sandhu Recognizing immediacy in an $N$-tree hierarchy and its application to protection groups . . . . . . . . . . . 1518--1525 W. H. Bahaa-El-Din and F. B. Bastani and J. E. Teng Performance analysis of periodic and concurrent data structure maintenance strategies for network servers . . . . . 1526--1536 L. L. Pollock and M. L. Soffa An incremental version of iterative data flow analysis . . . . . . . . . . . . . 1537--1549 D. Sarkar and S. C. De Sarkar A theorem prover for verifying iterative programs over integers . . . . . . . . . 1550--1566 G. Bernard and A. Duda and Y. Haddad and G. Harrus Primitives for distributed computing in a heterogeneous local area network environment . . . . . . . . . . . . . . 1567--1578 M. V. Devarakonda and R. K. Iyer Predictability of process resource usage: a measurement-based study on UNIX 1579--1586 B. E. Wojcik and Z. M. Wojcik Sufficient condition for a communication deadlock and distributed deadlock detection . . . . . . . . . . . . . . . 1587--1595 B. Littlewood and D. R. Miller Conceptual modeling of coincident failures in multiversion software . . . 1596--1614 C. Q. Yang and B. P. Miller Performance measurement for parallel and distributed programs: a structured and automatic approach . . . . . . . . . . . 1615--1629 L. Felician and G. Zalateu Validating Halstead's theory for Pascal programs . . . . . . . . . . . . . . . . 1630--1632 S. Chowdhury The mean resequencing delay for M/H$_K$ /$ \infty $ systems . . . . . . . . . . 1633--1638 J. A. Hager Software cost reduction methods in practice . . . . . . . . . . . . . . . . 1638--1644 A. N. Choudhary and W. H. Kohler and J. A. Stankovic and D. Towsley Correction to ``A modified priority based probe algorithm for distributed deadlock detection and resolution' (A. N. Choudhary et al.) . . . . . . . . . . 1644--1644
Y. Hirakawa Comments, with reply, on ``On the projection method for protocol verification'' by T.-Y. Cheung . . . . . 370--371
F. Kaudel Comments on ``Allocating programs containing branches and loops within a multiple processor system'' by D. Towsley . . . . . . . . . . . . . . . . 471
G. M. Karam Comments on ``Measurements of Ada overhead in OSI-style communications systems'' . . . . . . . . . . . . . . . 1435--1439 C. M. McNamee and R. A. Olsson Comments on ``Critical races in Ada programs'' . . . . . . . . . . . . . . . 1439
Lin Lin Wang Thorough investigation into ``An improved algorithm based on subset closures for synthesizing a relational database scheme'' . . . . . . . . . . . 271--274