Table of contents for issues of IEEE Transactions on Software Engineering

Last update: Sat Nov 23 12:25:13 MST 2019                Valid HTML 3.2!

Volume SE-4, Number 2, March / April, 1978
Volume SE-4, Number 5, September / October, 1978
Volume SE-6, Number 1, January / February, 1980
Volume SE-6, Number 2, March / April, 1980
Volume SE-6, Number 3, May / June, 1980
Volume SE-6, Number 4, July / August, 1980
Volume SE-6, Number 5, September / October, 1980
Volume SE-6, Number 6, November / December, 1980
Volume SE-7, Number 1, January / February, 1981
Volume SE-7, Number 2, March / April, 1981
Volume SE-7, Number 3, May / June, 1981
Volume SE-7, Number 4, July / August, 1981
Volume SE-7, Number 5, September / October, 1981
Volume SE-7, Number 6, November / December, 1981
Volume SE-8, Number 1, January / February, 1982
Volume SE-8, Number 2, March / April, 1982
Volume SE-8, Number 3, May / June, 1982
Volume SE-8, Number 4, July / August, 1982
Volume SE-8, Number 5, September / October, 1982
Volume SE-8, Number 6, November / December, 1982
Volume SE-9, Number 1, January / February, 1983
Volume SE-9, Number 2, March / April, 1983
Volume SE-9, Number 3, May / June, 1983
Volume SE-9, Number 4, July / August, 1983
Volume SE-9, Number 5, September / October, 1983
Volume SE-9, Number 6, November / December, 1983
Volume SE-10, Number 1, January / February, 1984
Volume SE-10, Number 2, March / April, 1984
Volume SE-10, Number 3, May / June, 1984
Volume SE-10, Number 4, July / August, 1984
Volume SE-10, Number 5, September / October, 1984
Volume SE-10, Number 6, November / December, 1984
Volume SE-11, Number 1, January, 1985
Volume SE-11, Number 2, February, 1985
Volume SE-11, Number 3, March, 1985
Volume SE-11, Number 4, April, 1985
Volume SE-11, Number 5, May, 1985
Volume SE-11, Number 6, June, 1985
Volume SE-11, Number 7, July, 1985
Volume SE-11, Number 8, August, 1985
Volume SE-11, Number 9, September, 1985
Volume SE-11, Number 10, October, 1985
Volume SE-11, Number 11, November, 1985
Volume SE-11, Number 12, December, 1985
Volume SE-12, Number 1, January, 1986
Volume SE-12, Number 2, February, 1986
Volume SE-12, Number 3, March, 1986
Volume SE-12, Number 4, April, 1986
Volume SE-12, Number 5, May, 1986
Volume SE-12, Number 6, June, 1986
Volume SE-12, Number 7, July, 1986
Volume SE-12, Number 8, August, 1986
Volume SE-12, Number 9, September, 1986
Volume SE-12, Number 10, October, 1986
Volume SE-12, Number 11, November, 1986
Volume SE-12, Number 12, December, 1986
Volume SE-13, Number 1, January, 1987
Volume SE-13, Number 2, February, 1987
Volume SE-13, Number 3, March, 1987
Volume SE-13, Number 4, April, 1987
Volume SE-13, Number 5, May, 1987
Volume SE-13, Number 6, June, 1987
Volume SE-13, Number 7, July, 1987
Volume SE-13, Number 8, August, 1987
Volume SE-13, Number 9, September, 1987
Volume SE-13, Number 10, October, 1987
Volume SE-13, Number 11, November, 1987
Volume SE-13, Number 12, December, 1987
Volume 14, Number 1, January, 1988
Volume 14, Number 2, February, 1988
Volume 14, Number 3, March, 1988
Volume 14, Number 4, April, 1988
Volume 14, Number 5, May, 1988
Volume 14, Number 6, June, 1988
Volume 14, Number 7, July, 1988
Volume 14, Number 8, August, 1988
Volume 14, Number 9, September, 1988
Volume 14, Number 10, October, 1988
Volume 14, Number 11, November, 1988
Volume 14, Number 12, December, 1988
Volume 15, Number 1, January, 1989
Volume 15, Number 2, February, 1989
Volume 15, Number 3, March, 1989
Volume 15, Number 4, April, 1989
Volume 15, Number 5, May, 1989
Volume 15, Number 6, June, 1989
Volume 15, Number 7, July, 1989
Volume 15, Number 8, August, 1989
Volume 15, Number 9, September, 1989
Volume 15, Number 10, October, 1989
Volume 15, Number 11, November, 1989
Volume 15, Number 12, December, 1989
Volume 16, Number 3, March, 1990
Volume 16, Number 4, April, 1990
Volume 16, Number 12, December, 1990
Volume 22, Number 4, April, 1996


IEEE Transactions on Software Engineering
Volume SE-4, Number 2, March / April, 1978

               G. J. Schick and   
                R. W. Wolverton   An Analysis of Competing Software
                                  Reliability Models . . . . . . . . . . . 104--120

IEEE Transactions on Software Engineering
Volume SE-4, Number 5, September / October, 1978

               T. F. Gannon and   
                  S. D. Shapiro   An Optimal Approach to Fault Tolerant
                                  Software Systems Design  . . . . . . . . 390--409


IEEE Transactions on Software Engineering
Volume SE-6, Number 1, January / February, 1980

                      Anonymous   Editor's Notice  . . . . . . . . . . . . 1--1
                 K. L. Heninger   Specifying Software Requirements for
                                  Complex Systems: New Techniques and
                                  Their Application  . . . . . . . . . . . 2--13
                      J. Guttag   Notes on Type Abstraction (Version 2)    13--23
                   D. R. Musser   Abstract Data Type Specification in the
                                  Affirm System  . . . . . . . . . . . . . 24--32
                     S. K. Basu   A Note on Synthesis of Inductive
                                  Assertions . . . . . . . . . . . . . . . 32--39
                       M. Tamir   ADI: Automatic Derivation of Invariants  40--48
                     A. P. Ravn   Device Monitors  . . . . . . . . . . . . 49--53
                   H. Takahashi   An Automatic-Controller Description
                                  Language . . . . . . . . . . . . . . . . 53--64
                  P. J. Denning   Working Sets Past and Present  . . . . . 64--84
                D. W. Leinbaugh   Guaranteed Response Times in a
                                  Hard-Real-Time Environment . . . . . . . 85--91
                J. Banerjee and   
                D. K. Hsiao and   
                       F. K. Ng   Database Transformation, Query
                                  Translation, and Performance Analysis of
                                  a New Database Computer in Supporting
                                  Hierarchical Database Management . . . . 91--109
                      Anonymous   Acknowledgment of referees . . . . . . . 110--111
                      Anonymous   Computer Communication Professionals
                                  \ldots . . . . . . . . . . . . . . . . . 112--112
                      Anonymous   Call for Papers  . . . . . . . . . . . . 112--112
                      Anonymous   Information for authors  . . . . . . . . 112--112
                      Anonymous   IEEE copyright form  . . . . . . . . . . 112--112
                      Anonymous   Information about the Society  . . . . . 112--c-112--c
                      Anonymous   IEEE Computer Society Publications . . . 112--e-112--e
                      Anonymous   IEEE Computer Society  . . . . . . . . . c2--c2
                      Anonymous   \booktitleIEEE Transactions on Software
                                  Engineering --- Table of contents  . . . c1--c1

IEEE Transactions on Software Engineering
Volume SE-6, Number 2, March / April, 1980

                      Anonymous   Guest Editorial  . . . . . . . . . . . . 117--117
                   R. C. Cheung   A User-Oriented Software Reliability
                                  Model  . . . . . . . . . . . . . . . . . 118--125
                  S. S. Yau and   
                  Fu-Chung Chen   An Approach to Concurrent Control Flow
                                  Checking . . . . . . . . . . . . . . . . 126--137
                T. L. Booth and   
                   C. A. Wiecek   Performance Abstract Data Types as a
                                  Tool in Software Performance Analysis
                                  and Design . . . . . . . . . . . . . . . 138--151
                     L. L. Beck   A Generalized Implementation Method for
                                  Relational Data Sublanguages . . . . . . 152--162
                   W. E. Howden   Functional Program Testing . . . . . . . 162--169
                     S. K. Basu   On Development of Iterative Programs
                                  from Function Specifications . . . . . . 170--182
                  D. L. Russell   State Restoration in Systems of
                                  Communicating Processes  . . . . . . . . 183--194
                  T. W. Mao and   
                      R. T. Yeh   Communication Port: A Language Concept
                                  for Concurrent Programming . . . . . . . 194--204
              Shi-Kuo Chang and   
                 Wu-Haung Cheng   A Methodology for Structured Database
                                  Decomposition  . . . . . . . . . . . . . 205--218
           P. S. Kritzinger and   
           A. E. Krzesinski and   
                   P. Teunissen   A Queuing Model of a Time-Sliced
                                  Priority-Driven Task Dispatching
                                  Algorithm  . . . . . . . . . . . . . . . 219--225
                   Pei Hsia and   
                    F. E. Petry   A Framework for Discipline in
                                  Programming  . . . . . . . . . . . . . . 226--232
                      Anonymous   Call for Papers  . . . . . . . . . . . . 232--232
                      Anonymous   IEEE Computer Society Publications . . . 232--a-232--a
                      Anonymous   IEEE Computer Society  . . . . . . . . . c2--c2
                      Anonymous   \booktitleIEEE Transactions on Software
                                  Engineering --- Table of contents  . . . c1--c1

IEEE Transactions on Software Engineering
Volume SE-6, Number 3, May / June, 1980

              B. Chandrasekaran   Guest Editorial: Special Collection on
                                  Program Testing  . . . . . . . . . . . . 233--235
              E. J. Weyuker and   
                  T. J. Ostrand   Theories of Program Testing and the
                                  Application of Revealing Subdomains  . . 236--246
                L. J. White and   
                    E. I. Cohen   A Domain Strategy for Computer Program
                                  Testing  . . . . . . . . . . . . . . . . 247--257
                   K. A. Foster   Error Sensitive Test Cases Analysis
                                  (ESTCA)  . . . . . . . . . . . . . . . . 258--264
               R. N. Taylor and   
                L. J. Osterweil   Anomaly Detection in Concurrent Software
                                  by Static Data Flow Analysis . . . . . . 265--278
             M. R. Woodward and   
                  D. Hedley and   
                  M. A. Hennell   Experience with Path Analysis and
                                  Testing of Programs  . . . . . . . . . . 278--286
                   U. Voges and   
                 L. Gmeiner and   
           A. A. Von Mayrhauser   SADAT --- an Automated Testing Tool  . . 286--290
                     F. N. Parr   An Alternative to the Rayleigh Curve
                                  Model for Software Development Effort    291--296
                    D. B. Lomet   Subsystems of Processes with Deadlock
                                  Avoidance  . . . . . . . . . . . . . . . 297--304
                   B. Walke and   
                   W. Rosenbohm   Deadline-Oriented Servicing:
                                  Waiting-Time Distributions . . . . . . . 304--312
                      Anonymous   Call for Papers  . . . . . . . . . . . . 312--312
                      Anonymous   IEEE Computer Society Publications . . . 312--a-312--a
                      Anonymous   IEEE Computer Society  . . . . . . . . . c2--c2
                      Anonymous   \booktitleIEEE Transactions on Software
                                  Engineering --- Table of contents  . . . c1--c1

IEEE Transactions on Software Engineering
Volume SE-6, Number 4, July / August, 1980

              C. N. Fischer and   
                  R. J. LeBlanc   The Implementation of Run-Time
                                  Diagnostics in Pascal  . . . . . . . . . 313--319
               A. Celentano and   
                P. D. Vigna and   
                  C. Ghezzi and   
                   D. Mandrioli   Separate Compilation and Partial
                                  Specification in Pascal  . . . . . . . . 320--328
              M. A. Hennell and   
                   J. A. Prudom   A Static Analysis of the NAG Library . . 329--333
            K. R. Tavernier and   
                P. H. Notredame   Macro-Based Cross Assemblers . . . . . . 334--340
                T. Y. Young and   
                      P. S. Liu   Overhead Storage Considerations and a
                                  Multilinear Method for Data File
                                  Compression  . . . . . . . . . . . . . . 340--347
                      A. Reuter   A Fast Transaction-Oriented Logging
                                  Scheme for Undo Recovery . . . . . . . . 348--356
                W. T. Hardgrave   Ambiguity in Processing Boolean Queries
                                  on TDMS Tree Structures: A Study of Four
                                  Different Philosophies . . . . . . . . . 357--372
              J. Labetoulle and   
                     G. Pujolle   Isolation Method in a Network of Queues  373--381
           P. S. Kritzinger and   
           A. E. Krzesinski and   
                   P. Teunissen   Incorporating System Overhead in Queuing
                                  Network Models . . . . . . . . . . . . . 381--390
                  J. E. Allchin   Modula and a Question of Time  . . . . . 390--391
                   A. C. Davies   The Analogy Between Electrical Networks
                                  and Flowcharts . . . . . . . . . . . . . 391--394
                 P. Bourret and   
                        P. Cros   Presentation and Correction of Errors in
                                  Operating System Measurements  . . . . . 395--398
                      Anonymous   CompCon 80 Fall  . . . . . . . . . . . . 398--398
                      Anonymous   Information about the Society  . . . . . 398--a-398--b
                      Anonymous   IEEE Computer Society Publications . . . 398--c-398--c
                      Anonymous   IEEE Computer Society  . . . . . . . . . c2--c2
                      Anonymous   \booktitleIEEE Transactions on Software
                                  Engineering --- Table of contents  . . . c1--c1

IEEE Transactions on Software Engineering
Volume SE-6, Number 5, September / October, 1980

                      Anonymous   Editor's Notice  . . . . . . . . . . . . 401--401
                Y. M. Babad and   
                   J. A. Hoffer   Data Element Security and Its Effects on
                                  File Segmentation  . . . . . . . . . . . 402--410
                       E. Gudes   The Design of a Cryptography Based
                                  Secure File System . . . . . . . . . . . 411--420
                L. J. Mekly and   
                      S. S. Yau   Software Design Representation Using
                                  Abstract Process Networks  . . . . . . . 420--435
               V. D. Gligor and   
                 S. H. Shattuck   On Deadlock Detection in Distributed
                                  Systems  . . . . . . . . . . . . . . . . 435--440
          C. V. Ramamoorthy and   
                       G. S. Ho   Performance Evaluation of Asynchronous
                                  Concurrent Systems Using Petri Nets  . . 440--449
              A. D. Birrell and   
                  R. M. Needham   A Universal File Server  . . . . . . . . 450--453
               V. R. Basili and   
                   R. E. Noonan   A Comparison of the Axiomatic and
                                  Functional Models of Structured
                                  Programming  . . . . . . . . . . . . . . 454--465
                     J. C. King   Program correctness: on inductive
                                  assertion methods  . . . . . . . . . . . 465--479
                    J. C. Huang   A New Verification Rule and Its
                                  Applications . . . . . . . . . . . . . . 480--484
                W. H. Leung and   
              C. V. Ramamoorthy   An Approach to Formal Specification of
                                  Control Modules  . . . . . . . . . . . . 485--489
                  B. Littlewood   Theories of Software Reliability: How
                                  Good Are They and How Can They Be
                                  Improved?  . . . . . . . . . . . . . . . 489--500
                     A. L. Goel   A Summary of the Discussion on ``An
                                  Analysis of Competing Software
                                  Reliability Models'' . . . . . . . . . . 501--502
                      Anonymous   Advance Announcing \ldots Tutorial
                                  Week80 . . . . . . . . . . . . . . . . . 502--502
                      Anonymous   Call for Papers  . . . . . . . . . . . . 502--502
                      Anonymous   Call for Papers  . . . . . . . . . . . . 502--502
                      Anonymous   IEEE Computer Society Publications . . . 502--c-502--c
                      Anonymous   IEEE Computer Society  . . . . . . . . . c2--c2
                      Anonymous   \booktitleIEEE Transactions on Software
                                  Engineering --- Table of contents  . . . c1--c1

IEEE Transactions on Software Engineering
Volume SE-6, Number 6, November / December, 1980

                      Anonymous   Guest Editorial  . . . . . . . . . . . . 505--505
                A. L. Baker and   
                   S. H. Zweben   A Comparison of Measures of Control Flow
                                  Complexity . . . . . . . . . . . . . . . 506--512
               R. N. Faiman and   
               A. A. Koretesoja   An Optimizing Pascal Compiler  . . . . . 512--519
             Ning-San Chang and   
                    King-Sun Fu   Query-by-Pictorial-Example . . . . . . . 519--524
                      T. Murata   Synthesis of Decision-Free Concurrent
                                  Systems for Prescribed Resources and
                                  Performance  . . . . . . . . . . . . . . 525--530
                  Kuo-Chung Tai   Program Testing Complexity and Test
                                  Criteria . . . . . . . . . . . . . . . . 531--538
                        K. Voss   Using Predicate/Transition-Nets to Model
                                  and Analyze Distributed Database Systems 539--544
                  S. S. Yau and   
               J. S. Collofello   Some Stability Measures for Software
                                  Maintenance  . . . . . . . . . . . . . . 545--552
                  R. F. Brender   Generation of Blisses  . . . . . . . . . 553--563
                     R. P. Cook   *MOD --- a Language for Distributed
                                  Programming  . . . . . . . . . . . . . . 563--571
              J. L. Bentley and   
                        M. Shaw   An Alphard Specification of a Correct
                                  and Efficient Transformation on Data
                                  Structures . . . . . . . . . . . . . . . 572--584
               D. J. Taylor and   
               D. E. Morgan and   
                    J. P. Black   Redundancy in Data Structures: Improving
                                  Software Fault Tolerance . . . . . . . . 585--594
               D. J. Taylor and   
               D. E. Morgan and   
                    J. P. Black   Redundancy in Data Structures: Some
                                  Theoretical Results  . . . . . . . . . . 595--602
              H. F. Ledgard and   
            J. A. Whiteside and   
                 W. Seymour and   
                      A. Singer   An Experiment on Human Engineering of
                                  Interactive Software . . . . . . . . . . 602--604
                      Anonymous   Advance Announcement \ldots Tutorial
                                  Week80 . . . . . . . . . . . . . . . . . 604--604
                      Anonymous   Call for Papers  . . . . . . . . . . . . 604--604
                      Anonymous   Call for Papers  . . . . . . . . . . . . 604--604
                      Anonymous   1980 Index \booktitleIEEE Transactions
                                  on Software Engineering Vol. SE-6  . . . 604--604
                      Anonymous   Information about the Society  . . . . . 604--h-604--h
                      Anonymous   IEEE Computer Society Publications . . . 604--i-604--i
                      Anonymous   IEEE Computer Society  . . . . . . . . . c2--c2
                      Anonymous   \booktitleIEEE Transactions on Software
                                  Engineering --- Table of contents  . . . c1--c1


IEEE Transactions on Software Engineering
Volume SE-7, Number 1, January / February, 1981

                      Anonymous   Editorial: Program Transformations . . . 1--2
                      R. Balzer   Transformational Implementation: An
                                  Example  . . . . . . . . . . . . . . . . 3--14
                    M. Broy and   
                      P. Pepper   Program Development as a Formal Activity 14--22
                        E. Deak   A Transformational Derivation of a
                                  Parsing Algorithm in a High-Level
                                  Language . . . . . . . . . . . . . . . . 23--31
                     D. S. Wile   Type Transformations . . . . . . . . . . 32--39
                  J. Arthur and   
                  J. Ramanathan   Design of Analyzers for Selective
                                  Program Analysis . . . . . . . . . . . . 39--51
                K. L. Clark and   
                M. H. Van Emden   Consequence Verification of Flowcharts   52--60
               L. H. Holley and   
                    B. K. Rosen   Qualified Data Flow Problems . . . . . . 60--78
              E. G. Coffman and   
                 E. Gelenbe and   
                     B. Plateau   Optimization of the Number of Copies in
                                  a Distributed Data Base  . . . . . . . . 78--84
                       P. A. Ng   Further Analysis of the
                                  Entity-Relationship Approach to Database
                                  Design . . . . . . . . . . . . . . . . . 85--99
              S. Al-Fedaghi and   
                 P. Scheuermann   Mapping Considerations in the Design of
                                  Schemas for the Relational Model . . . . 99--111
              B. Srinivasan and   
                      R. Sankar   Algorithms to Distribute a Database for
                                  Parallel Searching . . . . . . . . . . . 112--112
            R. L. Budzinski and   
             E. S. Davidson and   
                  W. Mayeda and   
                    H. S. Stone   DMIN: An Algorithm for Computing the
                                  Optimal Dynamic Allocation in a Virtual
                                  Memory Computer  . . . . . . . . . . . . 113--121
            R. L. Budzinski and   
                 E. S. Davidson   A Comparison of Dynamic and Static
                                  Virtual Memory Allocation Algorithms . . 122--131
                      P. Sipala   Optimum Cell Size for the Storage of
                                  Messages . . . . . . . . . . . . . . . . 132--134
                    A. J. Smith   Internal Scheduling and Memory
                                  Contention . . . . . . . . . . . . . . . 135--146
                J. W. Duran and   
               J. J. Wiorkowski   Capture-Recapture Sampling for
                                  Estimating Software Error Content  . . . 147--148
                      Anonymous   1980 Referees List . . . . . . . . . . . 148--149
                      Anonymous   Information for authors  . . . . . . . . 150--150
                      Anonymous   Call for Papers  . . . . . . . . . . . . 151--151
                      Anonymous   IEEE copyright form  . . . . . . . . . . 151--151
                      Anonymous   5th International Conference on Software
                                  Engineering  . . . . . . . . . . . . . . 151--151
                      Anonymous   IEEE Computer Society Publications . . . 151--j-151--j
                      Anonymous   IEEE Computer Society  . . . . . . . . . c2--c2
                      Anonymous   \booktitleIEEE Transactions on Software
                                  Engineering --- Table of contents  . . . c1--c1

IEEE Transactions on Software Engineering
Volume SE-7, Number 2, March / April, 1981

                      Anonymous   Editor's Notice  . . . . . . . . . . . . 161--161
                    R. L. Glass   Persistent Software Errors . . . . . . . 162--168
                       D. Comer   Principles of Program Design Induced
                                  from Experience with Small Public
                                  Programs . . . . . . . . . . . . . . . . 169--174
                    B. Lint and   
                    T. Agerwala   Communication Issues in the Design and
                                  Analysis of Parallel Algorithms  . . . . 174--188
                 D. Coleman and   
               J. W. Hughes and   
                   M. S. Powell   A Method for the Syntax Directed Design
                                  of Multiprograms . . . . . . . . . . . . 189--196
                   H. A. Ellozy   The Determination of Loop Invariants for
                                  Programs with Arrays . . . . . . . . . . 197--206
              N. Dershowitz and   
                       Z. Manna   Inference Rules for Program Annotation   207--222
             E. M. Reingold and   
                  J. S. Tilford   Tidier Drawings of Trees . . . . . . . . 223--228
                     P. Reisner   Formal Grammar and Human Factors Design
                                  of an Interactive Graphics System  . . . 229--240
                 R. Sanford and   
                      J. Gibson   Simplifld Alfu-N2merik FOnetiks (Sanf)   241--248
                  T. Chusho and   
                     T. Hayashi   Performance Analyses of Paging
                                  Algorithms for Compilation of a Highly
                                  Modularized Program  . . . . . . . . . . 248--254
                G. C. Goldbogen   PRIM: A Fast Matrix Transpose Method . . 255--257
                      Anonymous   Announcement & Call for Papers  . . . . . 257--257
                      Anonymous   Call for Papers  . . . . . . . . . . . . 257--257
                      Anonymous   IEEE Computer Society Publications . . . 257--d-257--d
                      Anonymous   IEEE Computer Society Press  . . . . . . 257--a-257--b
                      Anonymous   IEEE Computer Society  . . . . . . . . . c2--c2
                      Anonymous   \booktitleIEEE Transactions on Software
                                  Engineering --- Table of contents  . . . c1--c1

IEEE Transactions on Software Engineering
Volume SE-7, Number 3, May / June, 1981

                P. Y. R. Ma and   
                    T. G. Lewis   On the Design of a Microcode Compiler
                                  for a Machine-Independent High-Level
                                  Language . . . . . . . . . . . . . . . . 261--274
               C. Wetherell and   
                     A. Shannon   LR --- Automatic Parser Generator and
                                  LR(1) Parser . . . . . . . . . . . . . . 274--278
         G. K. Papakonstantinou   An Interpreter of Attribute Grammars and
                                  Its Application to Waveform Analysis . . 279--283
               Jo-Mei Chang and   
                    King-Sun Fu   Extended K-d Tree Database Organization:
                                  A Dynamic Multiattribute Clustering
                                  Method . . . . . . . . . . . . . . . . . 284--290
                   R. M. Bryant   On Homogeneity and On-Line--Off-Line
                                  Behavior in M/G/1 Queueing Systems . . . 291--299
               V. R. Basili and   
                   R. W. Reiter   A Controlled Experiment Quantitatively
                                  Comparing Software Development
                                  Approaches . . . . . . . . . . . . . . . 299--320
               A. Brandwajn and   
                J. A. Hernandez   A Study of a Mechanism for Controlling
                                  Multiprogrammed Memory in an Interactive
                                  System . . . . . . . . . . . . . . . . . 321--331
                      Anonymous   Call for Papers  . . . . . . . . . . . . 332--332
                      Anonymous   8th International Colloquium on
                                  Automata, Languages and Programming
                                  (ICALP 81) . . . . . . . . . . . . . . . 332--332
                      Anonymous   IEEE Computer Society Publications . . . 332--a-332--a
                      Anonymous   IEEE Computer Society  . . . . . . . . . c2--c2
                      Anonymous   \booktitleIEEE Transactions on Software
                                  Engineering --- Table of contents  . . . c1--c1

IEEE Transactions on Software Engineering
Volume SE-7, Number 4, July / August, 1981

               R. H. Thayer and   
               A. B. Pyster and   
                     R. C. Wood   Major Issues in Software Engineering
                                  Project Management . . . . . . . . . . . 333--342
                   D. E. Peercy   A Software Maintainability Evaluation
                                  Methodology  . . . . . . . . . . . . . . 343--351
                      Anonymous   Editor's Note  . . . . . . . . . . . . . 352--352
                  A. Singer and   
                 H. Ledgard and   
                   J. F. Hueras   The Annotated Assistant: A Step Towards
                                  Human Engineering  . . . . . . . . . . . 353--373
                      T. Robers   Global Comments  . . . . . . . . . . . . 370--370
                 B. Shneiderman   Comments from a Letter Written on July
                                  19, 1978 . . . . . . . . . . . . . . . . 370--371
                  A. Singer and   
                 H. Ledgard and   
                   J. F. Hueras   Author's reply . . . . . . . . . . . . . 373--374
                      G. Jomier   A Mathematical Model for the Comparison
                                  of Static and Dynamic Memory Allocation
                                  in a Paged System  . . . . . . . . . . . 375--385
                   L. M. Ni and   
                      Kai Hwang   Performance Modeling of Shared-Resource
                                  Array Processors . . . . . . . . . . . . 386--394
                   H. G. Perros   A Symmetrical Exponential Open Queue
                                  Network with Blocking and Feedback . . . 395--402
                    A. J. Smith   Analysis of Long Term File Reference
                                  Patterns for Application to File
                                  Migration Algorithms . . . . . . . . . . 403--417
                   J. Misra and   
                   K. M. Chandy   Proofs of Networks of Processes  . . . . 417--426
                  S. S. Yau and   
             Chen-Chau Yang and   
                    S. M. Shatz   An Approach to Distributed Computing
                                  System Software Design . . . . . . . . . 427--436
              S. K. Shrivastava   Structuring Distributed Systems for
                                  Recoverability and Crash Resistance  . . 436--447
                   P. R. Eggert   Runtime Checking for ISO Standard Pascal 447--448
                      Anonymous   Call for Papers  . . . . . . . . . . . . 448--448
                      Anonymous   IEEE Computer Society Publications . . . 448--a-448--a
                      Anonymous   IEEE Computer Society  . . . . . . . . . c2--c2
                      Anonymous   \booktitleIEEE Transactions on Software
                                  Engineering --- Table of contents  . . . c1--c1

IEEE Transactions on Software Engineering
Volume SE-7, Number 5, September / October, 1981

              D. R. Barstow and   
                   H. E. Shrobe   Guest Editorial: Programming
                                  Environments . . . . . . . . . . . . . . 449--450
                  J. W. Goodwin   Why Programming Environments Need
                                  Dynamic Data Types . . . . . . . . . . . 451--457
                    E. Kant and   
                  D. R. Barstow   The Refinement Paradigm: The Interaction
                                  of Coding and Efficiency Knowledge in
                                  Program Synthesis  . . . . . . . . . . . 458--471
             R. Medina-Mora and   
                   P. H. Feiler   An Incremental Programming Environment   472--482
                    B. W. Boehm   An Experiment in Small-Scale Application
                                  Software Engineering . . . . . . . . . . 482--493
                    V. H. Haase   Real-Time Behavior of Programs . . . . . 494--501
               J. L. W. Kessels   The Soma: A Programming Construct for
                                  Distributed Processing . . . . . . . . . 502--509
                   S. Henry and   
                      D. Kafura   Software Structure Metrics Based on
                                  Information Flow . . . . . . . . . . . . 510--518
                   A. J. Blikle   On the Development of Correct Specified
                                  Programs . . . . . . . . . . . . . . . . 519--527
                      Anonymous   Advance Announcement \ldots Tutorial
                                  Week West81  . . . . . . . . . . . . . . 527--527
                      Anonymous   Call for Papers  . . . . . . . . . . . . 527--527
                      Anonymous   IEEE Computer Society Publications . . . 527--b-527--b
                      Anonymous   IEEE Computer Society  . . . . . . . . . c2--c2
                      Anonymous   \booktitleIEEE Transactions on Software
                                  Engineering --- Table of contents  . . . c1--c1

IEEE Transactions on Software Engineering
Volume SE-7, Number 6, November / December, 1981

                      Anonymous   Editor's Notice  . . . . . . . . . . . . 529--529
                      Anonymous   Guest Editorial  . . . . . . . . . . . . 530--530
                  S. W. Smoliar   Operational Requirements Accommodation
                                  in Distributed System Design . . . . . . 531--537
          C. V. Ramamoorthy and   
                  Y. R. Mok and   
              F. B. Bastani and   
                 G. H. Chin and   
                      K. Suzuki   Application of a Methodology for the
                                  Development and Validation of Reliable
                                  Process Control Software . . . . . . . . 537--555
                  S. S. Yau and   
                   P. C. Grabow   A Model for Representing Programs Using
                                  Hierarchical Graphs  . . . . . . . . . . 556--574
              K. P. Eswaran and   
             V. C. Hamacher and   
                  G. S. Shedler   Collision-Free Access Control for
                                  Computer Communication Bus Networks  . . 574--582
                  S. H. Bokhari   A Shortest Tree Algorithm for Optimal
                                  Assignments Across Space and Time in a
                                  Distributed Processor System . . . . . . 583--589
                    R. L. Baber   A Method for Representing Data Items of
                                  Unlimited Length in a Computer Memory    590--593
               A. L. Mennie and   
                  G. H. Macewen   Information Flow Certification Using an
                                  Intermediate Code Program Representation 594--607
                  P. A. Lee and   
                J. L. Lloyd and   
              S. K. Shrivastava   Some Critical Comments on the Paper ``An
                                  Optimal Approach to Fault Tolerant
                                  Software Systems Design'' by Gannon and
                                  Shapiro  . . . . . . . . . . . . . . . . 608--610
               T. F. Gannon and   
                  S. D. Shapiro   Comments on the Critique of Lee, Lloyd,
                                  and Shrivastava  . . . . . . . . . . . . 610--611
                      Anonymous   Advance Announcement \ldots Tutorial
                                  Week East82  . . . . . . . . . . . . . . 611--611
                      Anonymous   1981 Index \booktitleIEEE Transactions
                                  on Software Engineering Vol. SE-7  . . . 611--611
                      Anonymous   IEEE Computer Society Publications . . . 611--f-611--f
                      Anonymous   IEEE Computer Society  . . . . . . . . . c2--c2
                      Anonymous   \booktitleIEEE Transactions on Software
                                  Engineering --- Table of contents  . . . c1--c1


IEEE Transactions on Software Engineering
Volume SE-8, Number 1, January / February, 1982

                   R. C. Waters   The Programmer's Apprentice: Knowledge
                                  Based Program Editing  . . . . . . . . . 1--12
                      A. Moitra   Direct Implementation of Algebraic
                                  Specification of Abstract Data Types . . 12--20
                     J. Schwarz   Using Annotations to Make Recursion
                                  Equations Behave . . . . . . . . . . . . 21--33
                  R. L. Probert   Optimal Insertion of Software Probes in
                                  Well-Delimited Programs  . . . . . . . . 34--42
           R. B. Dannenberg and   
                    G. W. Ernst   Formal Program Verification Using
                                  Symbolic Execution . . . . . . . . . . . 43--52
              A. Ephremides and   
                   O. A. Mowafi   Analysis of a Hybrid Access Scheme for
                                  Buffered Users-Probabilistic Time
                                  Division . . . . . . . . . . . . . . . . 52--61
             P. B. Hawthorn and   
                   D. J. DeWitt   Performance Analysis of Alternative
                                  Database Machine Architectures . . . . . 61--75
             A. K. Agrawala and   
             S. K. Tripathi and   
                      G. Ricart   Adaptive Routing Using a Virtual Waiting
                                  Time Technique . . . . . . . . . . . . . 76--81
                      Anonymous   Information for authors  . . . . . . . . 82--82
                      Anonymous   Advance Announcement \ldots Tutorial
                                  Week East 82 . . . . . . . . . . . . . . 83--83
                      Anonymous   Call for Papers  . . . . . . . . . . . . 83--83
                      Anonymous   IEEE copyright form  . . . . . . . . . . 83--83
                      Anonymous   Students in Computer Science and
                                  Engineering! . . . . . . . . . . . . . . 83--83
                      Anonymous   IEEE Computer Society Publications . . . 83--f-83--f
                      Anonymous   IEEE Computer Society  . . . . . . . . . c2--c2
                      Anonymous   \booktitleIEEE Transactions on Software
                                  Engineering --- Table of contents  . . . c1--c1

IEEE Transactions on Software Engineering
Volume SE-8, Number 2, March / April, 1982

               J. P. Kearns and   
                C. J. Meier and   
                    M. L. Soffa   The Performance Evaluation of Control
                                  Implementations  . . . . . . . . . . . . 89--96
            W. A. Abu-Sufah and   
                    D. A. Padua   Some Results on the Working Set
                                  Anomalies in Numerical Programs  . . . . 97--106
                       H. Samet   Code Optimization Considerations in List
                                  Processing Systems . . . . . . . . . . . 107--112
                  G. Harrus and   
                     B. Plateau   Queueing Analysis of a Reordering Issue  113--123
              A. J. Baroody and   
                   D. J. DeWitt   The Impact of Run-Time Schema
                                  Interpretation in a Network Data Model
                                  DBMS . . . . . . . . . . . . . . . . . . 123--136
                 L. A. Rowe and   
                   K. P. Birman   A Local Network Based on the UNIX
                                  Operating System . . . . . . . . . . . . 137--146
                  K. S. Shankar   A Functional Approach to Module
                                  Verification . . . . . . . . . . . . . . 147--160
                      Anonymous   Advance Announcement \ldots Tutorial
                                  Week East82  . . . . . . . . . . . . . . 160--160
                      Anonymous   Call for Papers  . . . . . . . . . . . . 160--160
                      Anonymous   Call for Participation . . . . . . . . . 160--160
                    M. Ossefort   Corrigendum to ``Proofs of Networks of
                                  Processes''  . . . . . . . . . . . . . . 160--160
                      Anonymous   Announcing an Important New Journal
                                  \booktitleIEEE Transactions on Medical
                                  Imaging  . . . . . . . . . . . . . . . . 160--a-160--a
                      Anonymous   IEEE Computer Society Publications . . . 160--e-160--e
                      Anonymous   IEEE Computer Society Press Checklist of
                                  New Titles December 1981 . . . . . . . . 160--d-160--d
                      Anonymous   IEEE Computer Society  . . . . . . . . . c2--c2
                      Anonymous   \booktitleIEEE Transactions on Software
                                  Engineering --- Table of contents  . . . c1--c1

IEEE Transactions on Software Engineering
Volume SE-8, Number 3, May / June, 1982

                    B. Bhargava   Guest Editorial: Reliability Issues in
                                  Distributed Systems  . . . . . . . . . . 165--167
                 D. R. Ries and   
                    G. C. Smith   Nested Transactions in Distributed
                                  Systems  . . . . . . . . . . . . . . . . 167--172
                 T. Minoura and   
                  G. Wiederhold   Resilient Extended True-Copy Token
                                  Scheme for a Distributed Database System 173--189
                      K. H. Kim   Approaches to Mechanization of the
                                  Conversation Scheme Based on Monitors    189--197
              M. J. Fischer and   
             N. D. Griffeth and   
                    N. A. Lynch   Global States of a Distributed System    198--202
                      B. Liskov   On Linguistic Support for Distributed
                                  Programs . . . . . . . . . . . . . . . . 203--210
             Yat-Sang Kwong and   
                        D. Wood   A New Method for Concurrency in B-Trees  211--222
               G. Ozsoyoglu and   
                     F. Y. Chin   Enhancing the Security of Statistical
                                  Databases with a Question-Answering
                                  System and a Kernel Design . . . . . . . 223--234
                C. C. Chang and   
               R. C. T. Lee and   
                       M. W. Du   Symbolic Gray Code as a Perfect
                                  Multiattribute Hashing Scheme for
                                  Partial Match Queries  . . . . . . . . . 235--249
                        P. Zave   An Operational Approach to Requirements
                                  Specification for Embedded Systems . . . 250--269
               V. R. Basili and   
                    H. D. Mills   Understanding and Documenting Programs   270--283
                    J. L. Reuss   Macro Implementation of a Structured
                                  Assembly Language  . . . . . . . . . . . 284--287
                 N. Francez and   
                       M. Rodeh   Achieving Distributed Termination
                                  without Freezing . . . . . . . . . . . . 287--292
                      Anonymous   1981 Referees List . . . . . . . . . . . 293--294
                      Anonymous   Announcing The 3rd International
                                  Conference on Distributed Computing
                                  Systems  . . . . . . . . . . . . . . . . 294--294
                      Anonymous   Call for Papers  . . . . . . . . . . . . 294--294
                      Anonymous   IEEE Computer Society Press Checklist of
                                  New Titles . . . . . . . . . . . . . . . 294--b-294--b
                      Anonymous   IEEE Computer Society Publications . . . 294--c-294--c
                      Anonymous   IEEE Computer Society  . . . . . . . . . c2--c2
                      Anonymous   \booktitleIEEE Transactions on Software
                                  Engineering --- Table of contents  . . . c1--c1

IEEE Transactions on Software Engineering
Volume SE-8, Number 4, July / August, 1982

                      Anonymous   Editorial  . . . . . . . . . . . . . . . 297--297
                 S. Balsamo and   
                    G. Iazeolla   An Extension of Norton's Theorem for
                                  Queueing Networks  . . . . . . . . . . . 298--305
                J. A. Stankovic   Good System Structure Features: Their
                                  Complexity and Execution Time Cost . . . 306--318
               L. J. Siegel and   
               H. J. Siegel and   
                    P. H. Swain   Performance Measures for Evaluating
                                  Algorithms for SIMD Machines . . . . . . 319--331
                 M. Maekawa and   
                    Y. Morimoto   Performance Adjustment of an APL
                                  Interpreter  . . . . . . . . . . . . . . 331--343
                F. Bazzichi and   
                   I. Spadafora   An Automatic Generator for Compiler
                                  Testing  . . . . . . . . . . . . . . . . 343--353
          C. V. Ramamoorthy and   
                  F. B. Bastani   Software Reliability --- Status and
                                  Perspectives . . . . . . . . . . . . . . 354--371
                   W. E. Howden   Weak Mutation Testing and Completeness
                                  of Test Sets . . . . . . . . . . . . . . 371--379
               L. A. Clarke and   
                 J. Hassell and   
               D. J. Richardson   A Close Look at Domain Testing . . . . . 380--390
                 E. J. H. Chang   Echo Algorithms: Depth Parallel
                                  Operations on General Graphs . . . . . . 391--401
              T. C. K. Chou and   
                  J. A. Abraham   Load Balancing in Distributed Systems    401--412
             T. C. Wesselkamper   Computer Program Schemata and the
                                  Processes They Generate  . . . . . . . . 412--419
                  M. Dubois and   
                   F. A. Briggs   Performance of Synchronized Iterative
                                  Processes in Multiprocessor Systems  . . 419--431
                F. L. Vermeulen   On the Combined Problem of Compaction
                                  and Sorting  . . . . . . . . . . . . . . 432--435
                  J. Kontos and   
         G. K. Papakonstantinou   The Interpretation of Meta Grammars
                                  Describing Syntax-Directed Interpreters
                                  Using an Attribute Grammar Interpreter   435--436
                       M. Lipow   Number of Faults per Line of Code  . . . 437--439
                G. Gardarin and   
                   M. Melkanoff   Proving Consistency of Database
                                  Transactions Written in Extended Pascal  440--446
                      Anonymous   6th International Conference on Software
                                  Engineering  . . . . . . . . . . . . . . 446--446
                      Anonymous   The Second Software Engineering
                                  Standards Applications Workshop Call for
                                  Papers . . . . . . . . . . . . . . . . . 446--446
                  G. H. MacEwen   Correction to ``Information Flow
                                  Certification Using an Intermediate Code
                                  Program Representation'' . . . . . . . . 446--446
                      Anonymous   IEEE Computer Society Publications . . . 446--c-446--c
                      Anonymous   IEEE Computer Society  . . . . . . . . . c2--c2
                      Anonymous   \booktitleIEEE Transactions on Software
                                  Engineering --- Table of contents  . . . c1--c1

IEEE Transactions on Software Engineering
Volume SE-8, Number 5, September / October, 1982

                B. G. Claybrook   A Specification Method for Specifying
                                  Data and Procedural Abstractions . . . . 449--459
             C. A. Sunshine and   
             D. H. Thompson and   
             R. W. Erickson and   
              S. L. Gerhart and   
                     D. Schwabe   Specification and Verification of
                                  Communication Protocols in AFFIRM Using
                                  State Transition Models  . . . . . . . . 460--489
                  M. S. Feather   Program Specification Applied to a Text
                                  Formatter  . . . . . . . . . . . . . . . 490--498
                  N. C. Shu and   
                  V. Y. Lum and   
                 F. C. Tung and   
                    C. L. Chang   Specification of Forms Processing and
                                  Business Procedures for Office
                                  Automation . . . . . . . . . . . . . . . 499--512
                   J. L. Gieser   On Horizontally Microprogrammed
                                  Microarchitecture Description Techniques 513--525
                  J. Archer and   
                      R. Conway   Display Condensation of Program Text . . 526--529
                       S. Kundu   On a Class of Linear Maps for Data
                                  Compression  . . . . . . . . . . . . . . 530--532
                      Anonymous   Advance Announcement \ldots Tutorial
                                  Week West82  . . . . . . . . . . . . . . 532--532
                      Anonymous   IEEE Computer Society Publications . . . 532--a-532--a
                      Anonymous   IEEE Computer Society  . . . . . . . . . c2--c2
                      Anonymous   \booktitleIEEE Transactions on Software
                                  Engineering --- Table of contents  . . . c1--c1

IEEE Transactions on Software Engineering
Volume SE-8, Number 6, November / December, 1982

                   H. Boral and   
               D. J. Dewitt and   
               D. Friedland and   
              N. F. Jarrell and   
                W. K. Wilkinson   Implementation of the Database Machine
                                  DIRECT . . . . . . . . . . . . . . . . . 533--543
                  S. B. Yao and   
               V. E. Waddle and   
                   B. C. Housel   View Modeling and Integration Using the
                                  Functional Data Model  . . . . . . . . . 544--553
                   G. S. Ho and   
              C. V. Ramamoorthy   Protocols for Deadlock Detection in
                                  Distributed Database Systems . . . . . . 554--557
            A. Silberschatz and   
                    Z. M. Kedam   A Family of Locking Protocols for
                                  Database Systems that Are Modeled by
                                  Directed Graphs  . . . . . . . . . . . . 558--562
                N. Roussopoulos   The Logical Access Path Schema of a
                                  Database . . . . . . . . . . . . . . . . 563--573
                 F. Y. Chin and   
                   G. Ozsoyoglu   Auditing and Inference Control in
                                  Statistical Databases  . . . . . . . . . 574--582
            Yang-Chang Hong and   
                    S. Y. W. Su   A Mechanism for Database Protection in
                                  Cellular-Logic Devices . . . . . . . . . 583--596
                 A. Lockman and   
                      N. Minsky   Unidirectional Transport of Rights and
                                  Take--Grant Control  . . . . . . . . . . 597--604
                   N. H. Gehani   Databases and Units of Measure . . . . . 605--611
                   H. Mendelson   Analysis of Extendible Hashing . . . . . 611--619
             R. N. Horspool and   
                E. C. R. Hehner   Comments on ``A Method for Representing
                                  Data Items of Unlimited Length in a
                                  Computer Memory''  . . . . . . . . . . . 620--621
                      Anonymous   Advance Announcement \ldots Tutorial
                                  Week West82  . . . . . . . . . . . . . . 621--621
                      Anonymous   Call for Papers  . . . . . . . . . . . . 621--621
                      Anonymous   Call for Papers 1983 Trends and
                                  Applications Conference  . . . . . . . . 621--621
                      Anonymous   1982 Index \booktitleIEEE Transactions
                                  on Software Engineering Vol. SE-18 . . . 621--621
                    R. L. Baber   Author's reply . . . . . . . . . . . . . 621--621
                      Anonymous   IEEE Computer Society Publications . . . 621--h-621--h
                      Anonymous   IEEE Computer Society  . . . . . . . . . c2--c2
                      Anonymous   \booktitleIEEE Transactions on Software
                                  Engineering --- Table of contents  . . . c1--c1


IEEE Transactions on Software Engineering
Volume SE-9, Number 1, January / February, 1983

                   R. Snodgrass   An Object-Oriented Command Language  . . 1--8
                 R. P. Cook and   
                  T. J. Leblanc   A Symbol Table Abstraction to Implement
                                  Languages with Explicit Scope Control    8--12
                 D. A. Lamb and   
                P. N. Hilfinger   Simulation of Procedure Variables Using
                                  Ada Tasks  . . . . . . . . . . . . . . . 13--15
               P. Ancilotti and   
                   M. Boari and   
                    N. Lijtmaer   Language Features for Access Control . . 16--25
                     J. Aoe and   
                Y. Yamamoto and   
                     R. Shimada   A Practical Method for Reducing Weak
                                  Precedence Parsers . . . . . . . . . . . 25--30
                 L. A. Rowe and   
                   K. A. Shoens   Programming Language Constructs for
                                  Screen Definition  . . . . . . . . . . . 31--39
               B. E. Jacobs and   
                  C. A. Walczak   A Generalized Query-by-Example Data
                                  Manipulation Language Based on Database
                                  Logic  . . . . . . . . . . . . . . . . . 40--57
             P. M. G. Apers and   
               A. R. Hevner and   
                      S. B. Yao   Optimization Algorithms for Distributed
                                  Queries  . . . . . . . . . . . . . . . . 57--68
                  E. J. Lau and   
                     D. Ferrari   Program Restructuring in a Multilevel
                                  Virtual Memory . . . . . . . . . . . . . 69--79
                   T. Nishigaki   Experiments on the Knee Criterion in a
                                  Multiprogrammed Computer System  . . . . 79--86
                 C. H. C. Leung   Analysis of Secondary Storage
                                  Fragmentation  . . . . . . . . . . . . . 87--93
              C. A. Coutant and   
             R. E. Griswold and   
                   D. R. Hanson   Measuring the Performance and Behavior
                                  of Icon Programs . . . . . . . . . . . . 93--103
                R. R. Oldehoeft   Program Graphs and Execution Behavior    103--108
                R. A. Marie and   
               J. M. Pellaumail   Steady-State Probabilities for a Queue
                                  with a General Service Distribution and
                                  State-Dependent Arrivals . . . . . . . . 109--113
             C. A. Sunshine and   
             D. H. Thompson and   
             R. W. Erickson and   
              S. L. Gerhart and   
                     D. Schwabe   Correction to ``Specification and
                                  Verification of Communication Protocols
                                  in AFFIRM Using State Transition
                                  Models'' . . . . . . . . . . . . . . . . 113--113
                      Anonymous   Information for authors  . . . . . . . . 114--114
                      Anonymous   Call for Papers  . . . . . . . . . . . . 115--115
                      Anonymous   IEEE copyright form  . . . . . . . . . . 115--115
                      Anonymous   IEEE Computer Society Publications . . . 115--b-115--b
                      Anonymous   IEEE Computer Society  . . . . . . . . . c2--c2
                      Anonymous   \booktitleIEEE Transactions on Software
                                  Engineering --- Table of contents  . . . c1--c1

IEEE Transactions on Software Engineering
Volume SE-9, Number 2, March / April, 1983

                      Anonymous   Editorial  . . . . . . . . . . . . . . . 117--117
                     J. D. Musa   Guest Editorial: COMPSAC '81 Special
                                  Section  . . . . . . . . . . . . . . . . 118--119
                    L. F. Rubin   Syntax-Directed Pretty Printing --- a
                                  First Step Towards a Syntax-Directed
                                  Editor . . . . . . . . . . . . . . . . . 119--127
               J. P. Kearns and   
                     S. DeFazio   Locality of Reference in Hierarchical
                                  Database Systems . . . . . . . . . . . . 128--134
                M. Y. L. Ip and   
               L. V. Saxton and   
                 V. V. Raghavan   On the Selection of an Optimal Set of
                                  Indexes  . . . . . . . . . . . . . . . . 135--143
             Duen-Ping Tsay and   
                      M. T. Liu   MIKE: A Network Operating System for the
                                  Distributed Double-Loop Computer Network 143--154
                 V. Y. Shen and   
                S. D. Conte and   
                 H. E. Dunsmore   Software Science Revisited: A Critical
                                  Analysis of the Theory and Its Empirical
                                  Support  . . . . . . . . . . . . . . . . 155--165
                  N. S. Coulter   Software Science and Cognitive
                                  Psychology . . . . . . . . . . . . . . . 166--171
              R. M. Negrini and   
                        M. Sami   Some Properties Derived from Structural
                                  Analysis of Program Graph Models . . . . 172--178
                 S. L. Getz and   
            G. Kalligiannis and   
                   S. R. Schach   A Very High-Level Interactive Graphical
                                  Trace for the Pascal Heap  . . . . . . . 179--185
              P. Schulthess and   
                      C. Jacobi   Anatomy of a Small Pascal Compiler . . . 185--191
                  S. T. Redwine   An Engineering Approach to Software Test
                                  Data Design  . . . . . . . . . . . . . . 191--200
               J. R. Menand and   
                      M. Becker   Modeling a Multiprocessor Architecture   201--210
                 V. Hayward and   
                      A. Osorio   A System to Automatically Analyze
                                  Assembled Programs . . . . . . . . . . . 210--213
                      Anonymous   Call for Papers  . . . . . . . . . . . . 213--213
                      Anonymous   Database Engineering . . . . . . . . . . 213--213
                      Anonymous   IEEE Computer Society Publications . . . 213--d-213--d
                      Anonymous   Nominations Invited for IEEE Awards  . . 213--b-213--c
                      Anonymous   IEEE Computer Society  . . . . . . . . . c2--c2
                      Anonymous   \booktitleIEEE Transactions on Software
                                  Engineering --- Table of contents  . . . c1--c1

IEEE Transactions on Software Engineering
Volume SE-9, Number 3, May / June, 1983

                      Anonymous   Editorial  . . . . . . . . . . . . . . . 217--217
                      Anonymous   State-of-the-Art Issues in Distributed
                                  Databases  . . . . . . . . . . . . . . . 218--218
                   D. Skeen and   
                 M. Stonebraker   A Formal Model of Crash Recovery in a
                                  Distributed System . . . . . . . . . . . 219--228
                        E. Wong   Dynamic Rematerialization: Processing
                                  Distributed Queries Using Redundant Data 228--232
            P. A. Bernstein and   
                 N. Goodman and   
                   Ming-Yee Lai   Analyzing Concurrency Control Algorithms
                                  When User and System Operations Differ   233--239
               D. S. Parker and   
                G. J. Popek and   
                 G. Rudisin and   
               A. Stoughton and   
               B. J. Walker and   
                  E. Walton and   
                 J. M. Chow and   
                 D. Edwards and   
                   S. Kiser and   
                       C. Kline   Detection of Mutual Inconsistency in
                                  Distributed Systems  . . . . . . . . . . 240--247
             J. Van Den Bos and   
           M. J. Plasmeijer and   
                   P. H. Hartel   Input--Output Tools: A Language Facility
                                  for Interactive and Real-Time Systems    247--259
                L. Logrippo and   
                    D. R. Skuce   File Structures, Program Structures, and
                                  Attributed Grammars  . . . . . . . . . . 260--266
               N. S. Prywes and   
                      A. Pnueli   Compilation of Nonprocedural
                                  Specifications into Computer Programs    267--279
                    F. G. Pagan   A Diagrammatic Notation for Abstract
                                  Syntax and Abstract Structured Objects   280--289
                  G. H. MacEwen   The Design for a Secure System Based on
                                  Program Analysis . . . . . . . . . . . . 289--299
                 D. Ferrari and   
                    Yiu-yoo Yih   VSWS: The Variable-Interval Sampled
                                  Working Set Policy . . . . . . . . . . . 299--305
                   M. W. Du and   
                T. M. Hsieh and   
                  K. F. Jea and   
                    D. W. Shieh   The Study of a New Perfect Hash Scheme   305--313
                    M. K. Sinha   Nonsensitive Data and Approximate
                                  Transactions . . . . . . . . . . . . . . 314--322
                 H. S. Koch and   
                       P. Kubat   Optimal Release Time of Computer
                                  Software . . . . . . . . . . . . . . . . 323--327
             P. R. McMullin and   
                   J. D. Gannon   Combining Testing with Formal
                                  Specifications: A Case Study . . . . . . 328--335
                     S. J. Zeil   Testing for Perturbations of Program
                                  Statements . . . . . . . . . . . . . . . 335--346
                J. W. Laski and   
                       B. Korel   A Data Flow Oriented Program Testing
                                  Strategy . . . . . . . . . . . . . . . . 347--354
                T. Anderson and   
                   J. C. Knight   A Framework for Software Fault Tolerance
                                  in Real-Time Systems . . . . . . . . . . 355--364
              R. L. Kashyap and   
                   B. J. Oommen   The Noisy Substring Matching Problem . . 365--370
          J. R. Jagannathan and   
                   R. Vasudevan   Comments on ``Protocols for Deadlock
                                  Detection in Distributed Database
                                  Systems''  . . . . . . . . . . . . . . . 371--371
                      Anonymous   Call for Papers  . . . . . . . . . . . . 372--372
                      Anonymous   1982 Referees List . . . . . . . . . . . 372--372
                      Anonymous   IEEE Computer Society Publications . . . 372--a-372--a
                      Anonymous   IEEE Computer Society  . . . . . . . . . c2--c2
                      Anonymous   \booktitleIEEE Transactions on Software
                                  Engineering --- Table of contents  . . . c1--c1

IEEE Transactions on Software Engineering
Volume SE-9, Number 4, July / August, 1983

           I. T. Hawryszkiewycz   A Semantic Design Method . . . . . . . . 373--384
              E. D. Carlson and   
                J. R. Rhyne and   
                   D. L. Weller   Software Structure for Display
                                  Management Systems . . . . . . . . . . . 385--394
                    J. R. White   On the Multiple Implementation of
                                  Abstract Data Types Within a Computation 395--411
         I. V. Ramakrishnan and   
                   J. C. Browne   A Paradigm for the Design of Parallel
                                  Algorithms with Applications . . . . . . 411--415
                W. E. Kluge and   
                   H. Schlutter   Petri Net Models for the Evaluation of
                                  Applicative Programs Based on $ \lambda
                                  $-Expressions  . . . . . . . . . . . . . 415--427
                     J. Ludewig   ESPRESO --- a System for Process Control
                                  Software Specification . . . . . . . . . 427--436
                 S. Jajodia and   
                     J. Liu and   
                       P. A. Ng   A Scheme of Parallel Processing for MIMD
                                  Systems  . . . . . . . . . . . . . . . . 436--445
                  P. Wegner and   
                   S. A. Smolka   Processes, Tasks, and Monitors: A
                                  Comparative Study of Concurrent
                                  Programming Primitives . . . . . . . . . 446--462
                     G. Bernard   Interconnection of Local Computer
                                  Networks: Modeling and Optimization
                                  Problems . . . . . . . . . . . . . . . . 463--470
                B. Bhargava and   
                      C. T. Hua   A Causal Model for Analyzing Distributed
                                  Concurrency Control Algorithms . . . . . 470--486
                    S. Ceri and   
                 S. Navathe and   
                  G. Wiederhold   Distribution Design of Logical Database
                                  Schemas  . . . . . . . . . . . . . . . . 487--504
                  To-Yat Cheung   Graph Traversal Techniques and the
                                  Maximum Flow Problem in Distributed
                                  Computation  . . . . . . . . . . . . . . 504--512
               L. N. Bhuyan and   
                  D. P. Agarval   Performance Analysis of FFT Algorithms
                                  on Multiprocessor Systems  . . . . . . . 512--521
               R. L. Larsen and   
                 A. K. Agrawala   Control of a Heterogeneous Two-Server
                                  Exponential Queueing System  . . . . . . 522--526
                A. Silberschatz   Extending CSP to Allow Dynamic Resource
                                  Management . . . . . . . . . . . . . . . 527--531
                 M. J. Ferguson   Weighted Processor Sharing-Results for
                                  Hyperexponential Servers . . . . . . . . 531--535
                A. Silberschatz   A Case for Non-Two-Phase Locking
                                  Protocols that Ensure Atomicity  . . . . 535--538
                      Anonymous   Advance Announcement \ldots Tutorial
                                  Week West83  . . . . . . . . . . . . . . 538--538
                      Anonymous   Advance Program  . . . . . . . . . . . . 538--538
                      Anonymous   Call for Papers  . . . . . . . . . . . . 538--538
                      Anonymous   IEEE Computer Society Publications . . . 538--c-538--c
                      Anonymous   IEEE Computer Society  . . . . . . . . . c2--c2
                      Anonymous   \booktitleIEEE Transactions on Software
                                  Engineering --- Table of contents  . . . c1--c1

IEEE Transactions on Software Engineering
Volume SE-9, Number 5, September / October, 1983

                 L. L. Beck and   
                  T. E. Perkins   A Survey of Software Engineering
                                  Practice: Tools, Methods, and Results    541--561
             R. D. H. Warburton   Managing and Predicting the Costs of
                                  Real-Time Software . . . . . . . . . . . 562--569
              N. G. Leveson and   
                   P. R. Harvey   Analyzing Software Safety  . . . . . . . 569--579
            C. L. Heitmeyer and   
                   J. D. McLean   Abstract requirements specification: A
                                  new approach and its application . . . . 580--589
               R. A. Nelson and   
                L. M. Haibt and   
                 P. B. Sheridan   Casting Petri Nets into Programs . . . . 590--602
             J. E. Coolahan and   
                N. Roussopoulos   Timing Requirements for Time-Driven
                                  Systems Using Augmented Petri Nets . . . 603--616
                 S. Jajodia and   
                   P. A. Ng and   
              F. N. Springsteel   The Problem of Equivalence for
                                  Entity-Relationship Diagrams . . . . . . 617--630
               I. Kalantari and   
                    G. McDonald   A Data Structure and an Algorithm for
                                  the Nearest Point Problem  . . . . . . . 631--634
                      Anonymous   Advance Announcement \ldots Tutorial
                                  Week West83  . . . . . . . . . . . . . . 634--634
                      Anonymous   Advance Program Summary Software
                                  Maintenance Workshop . . . . . . . . . . 634--634
                      Anonymous   Call for Papers  . . . . . . . . . . . . 634--634
                      Anonymous   IEEE Computer Society Publications . . . 634--c-634--c
                      Anonymous   IEEE Computer Society  . . . . . . . . . c2--c2
                      Anonymous   \booktitleIEEE Transactions on Software
                                  Engineering --- Table of contents  . . . c1--c1

IEEE Transactions on Software Engineering
Volume SE-9, Number 6, November / December, 1983

                      B. Curtis   Software Metrics: Guest Editor's
                                  Introduction . . . . . . . . . . . . . . 637--638
             A. J. Albrecht and   
                  J. E. Gaffney   Software Function, Source Lines of Code,
                                  and Development Effort Prediction: A
                                  Software Science Validation  . . . . . . 639--648
                  C. A. Behrens   Measuring the Productivity of Computer
                                  Systems Development Activities with
                                  Function Points  . . . . . . . . . . . . 648--652
               V. R. Basili and   
                R. W. Selby and   
                    T. Phillips   Metric Analysis and Data Validation
                                  Across Fortran Projects  . . . . . . . . 652--663
               V. R. Basili and   
                 D. H. Hutchens   An Empirical Study of a Syntactic
                                  Complexity Family  . . . . . . . . . . . 664--672
                L. J. Osterweil   Toolpack --- an Experimental Software
                                  Development Environment Research Project 673--685
                  J. S. Gourlay   A Mathematical Framework for the
                                  Investigation of Testing . . . . . . . . 686--709
               Bo-Shoe Chen and   
                      R. T. Yeh   Formal Specification and Verification of
                                  Distributed Systems  . . . . . . . . . . 710--722
             K. Ramamritham and   
                   R. M. Keller   Specification of Synchronizing Processes 722--733
                  S. S. Yau and   
                 M. U. Caglayan   Distributed Software System Design
                                  Representation Using Modified Petri Nets 733--745
                M. Trachtenberg   Order and Difficulty of Debugging  . . . 746--747
                      Anonymous   Advance Announcement Tutorial Week
                                  East84 . . . . . . . . . . . . . . . . . 747--747
                      Anonymous   Call for Papers Small Computer
                                  (R)Evolution . . . . . . . . . . . . . . 747--747
                      Anonymous   1983 Index \booktitleIEEE Transactions
                                  on Software Engineering Vol. SE-9  . . . 747--747
                      Anonymous   Join Us in the Quest for Technical
                                  Excellence . . . . . . . . . . . . . . . 747--747
                      Anonymous   Preliminary Announcement . . . . . . . . 747--747
                      Anonymous   IEEE Computer Society Publications . . . 747--n-747--n
                      Anonymous   IEEE Computer Society  . . . . . . . . . c2--c2
                      Anonymous   \booktitleIEEE Transactions on Software
                                  Engineering --- Table of contents  . . . c1--c1


IEEE Transactions on Software Engineering
Volume SE-10, Number 1, January / February, 1984

                      Anonymous   Editorial  . . . . . . . . . . . . . . . 1--1
                      Anonymous   Guest Editorial: Software Engineering
                                  Project Management . . . . . . . . . . . 2--3
                    B. W. Boehm   Software Engineering Economics . . . . . 4--21
                      J. Cooper   Software Development Management Planning 22--26
                    N. R. Howes   Managing Software Development Projects
                                  for Maximum Productivity . . . . . . . . 27--35
              F. J. Buckley and   
                      R. Poston   Software Quality Assurance . . . . . . . 36--41
                   J. P. McGill   The Software Engineering Shortage: A
                                  Third Choice . . . . . . . . . . . . . . 42--49
                     W. Scacchi   Managing Software Engineering Projects:
                                  A Social Analysis  . . . . . . . . . . . 49--59
                   W. Bryan and   
                      S. Siegel   Making Software Visible, Operational,
                                  and Maintainable in a Small Project
                                  Environment  . . . . . . . . . . . . . . 59--67
             G. M. Weinberg and   
                 D. P. Freedman   Reviews, Walkthroughs, and Inspections   68--72
                M. Branstad and   
                   P. B. Powell   Software Engineering Project Standards   73--78
                  E. H. Bersoff   Elements of Software Configuration
                                  Management . . . . . . . . . . . . . . . 79--87
                C. C. Chang and   
                   M. W. Du and   
                   R. C. T. Lee   Performance Analyses of Cartesian
                                  Product Files and Random Files . . . . . 88--99
                  F. B. Bastani   Performance Improvement of Abstractions
                                  Through Context Dependent
                                  Transformations  . . . . . . . . . . . . 100--116
                     J. Aoe and   
                Y. Yamamoto and   
                     R. Shimada   A Method for Improving String Pattern
                                  Matching Machines  . . . . . . . . . . . 116--120
                      Anonymous   IEEE copyright form  . . . . . . . . . . 121--122
                      Anonymous   Information for authors  . . . . . . . . 123--123
                      Anonymous   Advance Announcement . . . . . . . . . . 124--124
                      Anonymous   [Breaker page] . . . . . . . . . . . . . nil1--nil1
                      Anonymous   [Front cover]  . . . . . . . . . . . . . c1--c1
                      Anonymous   [Front cover]  . . . . . . . . . . . . . c2--c2
                      Anonymous   IEEE Computer Society  . . . . . . . . . nil1--nil1

IEEE Transactions on Software Engineering
Volume SE-10, Number 2, March / April, 1984

                      Anonymous   Editorial  . . . . . . . . . . . . . . . 125--125
                      Anonymous   Foreword . . . . . . . . . . . . . . . . 126--127
                  C. Morgan and   
                      B. Sufrin   Specification of the UNIX Filing System  128--142
                   I. D. Cottam   The Rigorous Development of a System
                                  Version Control Program  . . . . . . . . 143--154
             F. W. Beichter and   
                  O. Herzog and   
                     H. Petzsch   SLAN-4 --- a software specification and
                                  design language  . . . . . . . . . . . . 155--162
                    F. Cristian   Correct and Robust Programs  . . . . . . 163--174
                   W. M. Turski   On Programming by Iterations . . . . . . 175--178
                A. Silberschatz   Cell: A Distributed Computing
                                  Modularization Concept . . . . . . . . . 178--185
                   M. L. Wu and   
                    T. Y. Hwang   Access Control with Single-Key-Lock  . . 185--191
                 R. H. Katz and   
                   T. J. Lehman   Database Support for Versions and
                                  Alternatives of Large Design Files . . . 191--200
         S. Christodoulakis and   
                   C. Faloutsos   Design Considerations for a Message File
                                  Server . . . . . . . . . . . . . . . . . 201--210
           H. Garcia-Molina and   
                 F. Germano and   
                   W. H. Kohler   Debugging a Distributed Computing System 210--219
                      Anonymous   Call for Papers  . . . . . . . . . . . . 220--220
                      Anonymous   [Front cover]  . . . . . . . . . . . . . c2--c2
                      Anonymous   [Front cover]  . . . . . . . . . . . . . c1--c1
                      Anonymous   Table of contents  . . . . . . . . . . . nil1--nil1

IEEE Transactions on Software Engineering
Volume SE-10, Number 3, May / June, 1984

             R. J. Le Blanc and   
                  C. N. Fischer   A Simple Separate Compilation Mechanism
                                  for Block-Structured Languages . . . . . 221--227
             M. S. McKendry and   
                 R. H. Campbell   Implementing Language Support in
                                  High-Level Languages . . . . . . . . . . 227--236
                 M. J. Ferguson   Multiaccess in a Nonqueueing Mailbox
                                  Environment  . . . . . . . . . . . . . . 237--243
            A. E. Oldehoeft and   
                 S. F. Jennings   Dataflow Resource Managers and Their
                                  Synthesis from Open Path Expressions . . 244--257
                   L. Svobodova   Resilient Distributed Computing  . . . . 257--268
                      C. Abbott   Intervention Schedules for Real-Time
                                  Programming  . . . . . . . . . . . . . . 268--274
               D. D. Dunlop and   
                   V. R. Basili   A Heuristic for Deriving Loop Functions  275--285
              N. C. K. Phillips   Safe Data Type Specifications  . . . . . 285--289
                B. W. Boehm and   
                 T. E. Gray and   
                    T. Seewaldt   Prototyping Versus Specifying: A
                                  Multiproject Experiment  . . . . . . . . 290--303
               D. L. Weller and   
                     B. W. York   A Relational Representation of an
                                  Abstract Type System . . . . . . . . . . 303--309
              D. L. Spooner and   
                       E. Gudes   A Unifying Approach to the Design of a
                                  Secure Database Operating System . . . . 310--319
                   V. D. Gligor   A Note on Denial-of-Service in Operating
                                  Systems  . . . . . . . . . . . . . . . . 320--324
                      Anonymous   [Front cover]  . . . . . . . . . . . . . c2--c2
                      Anonymous   [Front cover]  . . . . . . . . . . . . . c1--c1
                      Anonymous   Table of contents  . . . . . . . . . . . nil1--nil1

IEEE Transactions on Software Engineering
Volume SE-10, Number 4, July / August, 1984

                  S. S. Lam and   
                  A. U. Shankar   Protocol Verification via Projections    325--342
                   N. H. Gehani   Broadcasting Sequential Processes (BSP)  343--351
                      M. Weiser   Program Slicing  . . . . . . . . . . . . 352--357
                  A. Reuter and   
                   H. Kinzinger   Automatic Design of the Internal Schema
                                  for a CODASYL Database System  . . . . . 358--375
       W. K. Wiener-Ehrlich and   
              J. R. Hamrick and   
                   V. F. Rupolo   Modeling Software Behavior in Terms of a
                                  Formal Life Cycle Curve: Implications
                                  for Software Maintenance . . . . . . . . 376--383
                 H. G. Stuebing   A Software Engineering Environment (SEE)
                                  for Weapon System Software . . . . . . . 384--397
                  I. Vessey and   
                       R. Weber   Research on Structured Programming: An
                                  Empiricist's Evaluation  . . . . . . . . 397--407
                     T. C. Snow   Use of Software Engineering Practices at
                                  a Small MIS Shop . . . . . . . . . . . . 408--413
              W. J. Stewart and   
                    W. P. Stohs   Some Equivalence Results for
                                  Load-Independent Exponential Queueing
                                  Networks . . . . . . . . . . . . . . . . 414--422
               T. O. Alanko and   
             H. H. A. Erkio and   
                  I. J. Haikala   Virtual Memory Behavior of Some Sorting
                                  Algorithms . . . . . . . . . . . . . . . 422--431
                 J. Jachner and   
                  V. K. Agarwal   Data Flow Anomaly Detection  . . . . . . 432--437
                J. W. Duran and   
                   S. C. Ntafos   An Evaluation of Random Testing  . . . . 438--444
             C. H. C. Leung and   
                     Q. H. Choo   On the Execution of Large Batch Programs
                                  in Unreliable Computing Systems  . . . . 444--450
                  R. F. Sarraga   Static Data Flow Analysis of PL/I
                                  Programs with the PROBE System . . . . . 451--459
                  J. E. Gaffney   Estimating the Number of Faults in Code  459--464
             G. D. Lakhanai and   
                     J. S. Wang   Comments on ``Optimization Algorithms
                                  for Distributed Queries''  . . . . . . . 464--465
                     W. Perrizo   A Method for Processing Distributed
                                  Database Queries . . . . . . . . . . . . 466--471
                      Anonymous   Call for Papers  . . . . . . . . . . . . 472--472
                      Anonymous   [Front cover]  . . . . . . . . . . . . . c2--c2
                      Anonymous   [Front cover]  . . . . . . . . . . . . . c1--c1
                      Anonymous   Table of contents  . . . . . . . . . . . nil1--nil1

IEEE Transactions on Software Engineering
Volume SE-10, Number 5, September / October, 1984

                      Anonymous   Editorial Announcement . . . . . . . . . 473--473
                      Anonymous   Foreword . . . . . . . . . . . . . . . . 474--477
                E. Horowitz and   
                   J. B. Munson   An Expansive View of Reusable Software   477--487
                    T. C. Jones   Reusability in Programming: A Survey of
                                  the State of the Art . . . . . . . . . . 488--494
                 T. A. Standish   An Essay on Software Reuse . . . . . . . 494--497
             R. G. Lanergan and   
                   C. A. Grasso   Software Engineering with Reusable
                                  Designs and Code . . . . . . . . . . . . 498--501
                   Y. Matsumoto   Some Experiences in Promoting Reusable
                                  Software: Presentation in Higher
                                  Abstract Levels  . . . . . . . . . . . . 502--513
                B. W. Kernighan   The Unix System and Software Reusability 513--518
                G. A. Curry and   
                    R. M. Ayers   Experience with Traits in the Xerox Star
                                  Workstation  . . . . . . . . . . . . . . 519--527
                   J. A. Goguen   Parameterized Programming  . . . . . . . 528--543
         S. D. Litvintchouk and   
                A. S. Matsumoto   Design of Ada Systems Yielding Reusable
                                  Components: An Approach Using Structured
                                  Algebraic Specification  . . . . . . . . 544--551
                T. T. Cheng and   
                 E. D. Lock and   
                   N. S. Prywes   Use of Very High Level Languages and
                                  Program Generation by Management
                                  Professionals  . . . . . . . . . . . . . 552--563
                J. M. Neighbors   The Draco Approach to Constructing
                                  Software from Reusable Components  . . . 564--574
                J. M. Boyle and   
             M. N. Muralidharan   Program Reusability through Program
                                  Transformation . . . . . . . . . . . . . 574--588
                 T. E. Cheatham   Reusability Through Program
                                  Transformations  . . . . . . . . . . . . 589--594
                 E. Soloway and   
                     K. Ehrlich   Empirical Studies of Programming
                                  Knowledge  . . . . . . . . . . . . . . . 595--609
                      Anonymous   Call For Papers  . . . . . . . . . . . . 610--612
                      Anonymous   [Front cover]  . . . . . . . . . . . . . c1--c1
                      Anonymous   [Front cover]  . . . . . . . . . . . . . c2--c2
                      Anonymous   Table of contents  . . . . . . . . . . . nil1--nil1

IEEE Transactions on Software Engineering
Volume SE-10, Number 6, November / December, 1984

                      Anonymous   A Note from the Editor-in-Chief  . . . . 613--613
                 S. Jajodia and   
                       P. A. Ng   Representative instances and $ \gamma
                                  $-acyclic relational schemes . . . . . . 614--618
                 D. R. Dolk and   
                B. R. Konsynski   Knowledge Representation for Model
                                  Management Systems . . . . . . . . . . . 619--628
                   U. Dayal and   
                    H. Y. Hwang   View Definition and Generalization for
                                  Database Integration in a Multidatabase
                                  System . . . . . . . . . . . . . . . . . 628--645
                   R. Attar and   
            P. A. Bernstein and   
                     N. Goodman   Site Initialization, Recovery, and
                                  Backup in a Distributed Database System  645--650
                  C. Batini and   
                   M. Lenzerini   A Methodology for Data Schema
                                  Integration in the Entity Relationship
                                  Model  . . . . . . . . . . . . . . . . . 650--664
                  L. Lilien and   
                    B. Bhargava   A Scheme for Batch Verification of
                                  Integrity Assertions in a Database
                                  System . . . . . . . . . . . . . . . . . 664--680
             M. Hatzopoulos and   
                  J. G. Kollias   On the Optimal Selection of Multilist
                                  Database Structures  . . . . . . . . . . 681--687
                 A. Iannino and   
                 J. D. Musa and   
                 K. Okumoto and   
                  B. Littlewood   Criteria for Software Reliability Model
                                  Comparisons  . . . . . . . . . . . . . . 687--691
                 K. G. Shin and   
                      Y. H. Lee   Evaluation of Error Recovery Blocks Used
                                  for Cooperating Processes  . . . . . . . 692--700
                   J. C. Laprie   Dependability Evaluation of Software
                                  Systems in Operation . . . . . . . . . . 701--714
                        C. Wong   A Successful Software Development  . . . 714--727
               V. R. Basili and   
                    D. M. Weiss   A Methodology for Collecting Valid
                                  Software Engineering Data  . . . . . . . 728--738
             N. B. Corrigan and   
                  J. D. Starkey   A Concurrent General Purpose Operator
                                  Interface  . . . . . . . . . . . . . . . 738--748
               A. Ben-David and   
           M. I. Ben-Porath and   
                 J. Z. Loeb and   
                        M. Rich   An Industrial Software Engineering
                                  Retraining Course: Development
                                  Considerations and Lessons Learned . . . 748--755
                    B. Plattner   Real-Time Execution Monitoring . . . . . 756--764
                   S. M. German   Monitoring for Deadlock and Blocking in
                                  Ada Tasking  . . . . . . . . . . . . . . 764--777
                      U. Manber   Concurrent Maintenance of Binary Search
                                  Trees  . . . . . . . . . . . . . . . . . 777--784
                   D. B. Benson   Counting Paths: Nondeterminism as Linear
                                  Algebra  . . . . . . . . . . . . . . . . 785--794
                   S. C. Ntafos   On Required Element Testing  . . . . . . 795--803
                   M. G. Khayat   A Concurrency Measure  . . . . . . . . . 804--810
                D. W. Leinbaugh   Selectors: High-Level Resource
                                  Schedulers . . . . . . . . . . . . . . . 810--825
               T. Higashino and   
                    M. Mori and   
                Y. Sugiyama and   
               K. Taniguchi and   
                      T. Kasami   An Algebraic Specification of HDLC
                                  Procedures and Its Verification  . . . . 825--836
                 G. Serazzi and   
                  M. Calzarossa   Adaptive Optimization of a System's Load 837--845
                    M. G. Gouda   Closed Covers: To Verify Progress for
                                  Communicating Finite State Machines  . . 846--855
                      H. Kameda   A Property of Normalization Constants
                                  for Closed Queueing Networks . . . . . . 856--857
                      Anonymous   1984 Index \booktitleIEEE Transactions
                                  on Software Engineering  . . . . . . . . 858--862
                      Anonymous   Call for papers  . . . . . . . . . . . . 863--864
                      Anonymous   [Front cover]  . . . . . . . . . . . . . c2--c2
                      Anonymous   [Front cover]  . . . . . . . . . . . . . c1--c1
                      Anonymous   Table of contents  . . . . . . . . . . . nil1--nil1


IEEE Transactions on Software Engineering
Volume SE-11, Number 1, January, 1985

                      Anonymous   Editorial  . . . . . . . . . . . . . . . 1--2
            B. G. Claybrook and   
            A. M. Claybrook and   
                    J. Williams   Defining Database Views as Data
                                  Abstractions . . . . . . . . . . . . . . 3--14
                   C. Mohan and   
                 D. Fussell and   
                Z. M. Kedem and   
                A. Silberschatz   Lock Conversion in Non-Two-Phase Locking
                                  Protocols  . . . . . . . . . . . . . . . 15--22
                    F. Cristian   A Rigorous Approach to Fault-Tolerant
                                  Programming  . . . . . . . . . . . . . . 23--31
                 R. A. Kemmerer   Testing Formal Specifications to Detect
                                  Design Errors  . . . . . . . . . . . . . 32--43
                G. T. Almes and   
                A. P. Black and   
             E. D. Lazowska and   
                      J. D. Noe   The Eden System: A Technical Review  . . 43--59
                  M. Ahamad and   
                A. J. Bernstein   An Application of Name Based Addressing
                                  to Low Level Distributed Algorithms  . . 59--67
                M. K. Sinha and   
                   N. Natarajan   A Priority Based Distributed Deadlock
                                  Detection Algorithm  . . . . . . . . . . 67--80
                   B. Dasarathy   Timing Constraints of Real-Time Systems:
                                  Constructs for Expressing Them, Methods
                                  of Validating Them . . . . . . . . . . . 80--86
                    D. B. Lomet   Making Pointers Safe in System
                                  Programming Languages  . . . . . . . . . 87--96
                   M. Jarke and   
                J. A. Tuner and   
                E. A. Stohr and   
               Y. Vassiliou and   
                N. H. White and   
                  K. Michielsen   A Field Evaluation of Natural Language
                                  for Data Retrieval . . . . . . . . . . . 97--114
                   J. Cohen and   
                    S. Kolodner   Estimating the Speedup in Parallel
                                  Parsing  . . . . . . . . . . . . . . . . 114--124
                    M. O. Fryer   Risk Assessment of Computer Controlled
                                  Systems  . . . . . . . . . . . . . . . . 125--129
                      G. Harrus   A Model for the Basic Block Protocol of
                                  the Cambridge Ring . . . . . . . . . . . 130--136
                     A. Pashtan   Operating System Models in a Concurrent
                                  Pascal Environment: Complexity and
                                  Performance Considerations . . . . . . . 136--141
                      Anonymous   Call for papers  . . . . . . . . . . . . 142--142
                      Anonymous   Information for authors  . . . . . . . . 143--143
                      Anonymous   IEEE copyright form  . . . . . . . . . . 143--143
                      Anonymous   IEEE Computer Society Publications . . . 143--b-143--b
                      Anonymous   IEEE Computer Society  . . . . . . . . . c2--c2
                      Anonymous   \booktitleIEEE Transactions on Software
                                  Engineering --- Table of contents  . . . c1--c1

IEEE Transactions on Software Engineering
Volume SE-11, Number 2, February, 1985

           D. L. Tuomenoksa and   
                   H. J. Siegel   Task Scheduling on the PASM Parallel
                                  Processing System  . . . . . . . . . . . 145--157
                D. M. Weiss and   
                   V. R. Basili   Evaluating Software Development by
                                  Analysis of Changes: Some Data from the
                                  Software Engineering Laboratory  . . . . 157--168
                    I. J. Hayes   Applying Formal Specification to
                                  Software Development in Industry . . . . 169--178
                   T. Yuasa and   
                    R. Nakajima   IOTA: A Modular Programming System . . . 179--187
              J. B. Peachey and   
                 R. B. Bunt and   
                 C. J. Colbourn   Some Empirical Observations on Program
                                  Behavior with Applications to Program
                                  Restructuring  . . . . . . . . . . . . . 188--193
                 S. Balsamo and   
                    G. Iazeolla   Product-Form Synthesis of Queueing
                                  Networks . . . . . . . . . . . . . . . . 194--199
                    S. Muro and   
                 T. Ibaraki and   
                H. Miyajima and   
                    T. Hasegawa   Evaluation of the File Redundancy in
                                  Distributed Database Systems . . . . . . 199--205
                    A. Chan and   
                        R. Gray   Implementing Distributed Read-Only
                                  Transactions . . . . . . . . . . . . . . 205--212
                  Hung-Chang Du   On the File Design Problem for Partial
                                  Match Retrieval  . . . . . . . . . . . . 213--222
                 R. K. Iyer and   
                     P. Velardi   Hardware-Related Software Errors:
                                  Measurement and Analysis . . . . . . . . 223--231
               H. A. Jensen and   
                    K. Vairavan   An Experimental Study of Software
                                  Metrics for Real-Time Software . . . . . 231--234
              E. G. Coffman and   
               T. T. Kadota and   
                    L. A. Shepp   On the Asymptotic Optimality of
                                  First-Fit Storage Allocation . . . . . . 235--239
                      Anonymous   Call for papers  . . . . . . . . . . . . 240--240
                      Anonymous   Call for Papers and Panel Session
                                  Proposals  . . . . . . . . . . . . . . . 240--240
                      Anonymous   IEEE Computer Society Publications . . . 240--a-240--a
                      Anonymous   IEEE Computer Society  . . . . . . . . . c2--c2
                      Anonymous   \booktitleIEEE Transactions on Software
                                  Engineering --- Table of contents  . . . c1--c1

IEEE Transactions on Software Engineering
Volume SE-11, Number 3, March, 1985

                   W. E. Howden   Foreword . . . . . . . . . . . . . . . . 241--241
                  M. Bidoit and   
                  B. Biebow and   
               M. C. Gaudel and   
                  C. Gresse and   
                    G. D. Guiho   Exception Handling: Formal Specification
                                  and Systematic Program Construction  . . 242--252
               S. W. Draper and   
                   D. A. Norman   Software Engineering for User Interfaces 252--258
               D. L. Parnas and   
             P. C. Clements and   
                    D. M. Weiss   The Modular Structure of Complex Systems 259--266
              W. L. Johnson and   
                     E. Soloway   PROUST: Knowledge-Based Program
                                  Understanding  . . . . . . . . . . . . . 267--275
                    S. P. Reiss   PECAN: Program Development Systems that
                                  Support Multiple Views . . . . . . . . . 276--285
                   W. Teitelman   A Tour Through Cedar . . . . . . . . . . 285--302
               R. N. Taylor and   
                 T. A. Standish   Steps to an Advanced Ada$^1$ Programming
                                  Environment  . . . . . . . . . . . . . . 302--310
                      Anonymous   Advance Program  . . . . . . . . . . . . 311--313
                      Anonymous   Call for papers  . . . . . . . . . . . . 314--314
                      Anonymous   Call for Papers and Panel Session
                                  Proposals  . . . . . . . . . . . . . . . 315--315
                      Anonymous   Information for authors  . . . . . . . . 315--315
                      Anonymous   Beyond the Basics: A Software
                                  Publication Series for Successful
                                  Computer Professionals From the IEEE
                                  Computer Society . . . . . . . . . . . . 315--a-315--a
                      Anonymous   IEEE Computer Society Publications . . . 315--b-315--b
                      Anonymous   IEEE Computer Society  . . . . . . . . . c2--c2
                      Anonymous   \booktitleIEEE Transactions on Software
                                  Engineering --- Table of contents  . . . c1--c1

IEEE Transactions on Software Engineering
Volume SE-11, Number 4, April, 1985

                 V. Y. Shen and   
                 Tze-jie Yu and   
              S. M. Thebaut and   
                  L. R. Paulsen   Identifying Error-Prone Software --- an
                                  Empirical Study  . . . . . . . . . . . . 317--324
                    S. Ceri and   
                     G. Gottlob   Translating SQL Into Relational Algebra:
                                  Optimization, Semantics, and Equivalence
                                  of SQL Queries . . . . . . . . . . . . . 324--345
                   A. Thomasian   Performance Evaluation of Centralized
                                  Databases with Static Locking  . . . . . 346--355
            N. Roussopoulos and   
                      R. T. Yeh   SEES --- a Software testing Environment
                                  Support System . . . . . . . . . . . . . 355--366
                   S. Rapps and   
                  E. J. Weyuker   Selecting Software Test Data Using Data
                                  Flow Information . . . . . . . . . . . . 367--375
                       T. Downs   An Approach to the Modeling of Software
                                  Testing with Some Applications . . . . . 375--386
                D. E. Comer and   
                   N. H. Gehani   Flex: A High-Level Language for
                                  Specifying Customized Microprocessors    387--396
                   N. Natarajan   Communication and Synchronization
                                  Primitives for Distributed Programs  . . 396--416
                   M. K. Molloy   Discrete Time Stochastic Petri Nets  . . 417--423
                  J. Kramer and   
                       J. Magee   Dynamic Configuration for Distributed
                                  Systems  . . . . . . . . . . . . . . . . 424--436
             Ching-Chy Wang and   
                    M. L. Soffa   Eager Reclamation  . . . . . . . . . . . 437--439
                      F. Luccio   Variations on a Method for Representing
                                  Data Items of Unlimited Length . . . . . 439--441
                      Anonymous   Call for Papers  . . . . . . . . . . . . 442--442
                      Anonymous   IEEE copyright form  . . . . . . . . . . 443--443
                      Anonymous   Beyond the Basics: A Software
                                  Publication Series for Successful
                                  Computer Professionals From the IEEE
                                  Computer Society . . . . . . . . . . . . 443--c-443--c
                      Anonymous   IEEE Computer Society Publications . . . 443--b-443--b
                      Anonymous   IEEE Computer Society  . . . . . . . . . c2--c2
                      Anonymous   \booktitleIEEE Transactions on Software
                                  Engineering --- Table of contents  . . . c1--c1

IEEE Transactions on Software Engineering
Volume SE-11, Number 5, May, 1985

                      Anonymous   Editorial  . . . . . . . . . . . . . . . 445--445
                A. J. Bernstein   A Loosely Coupled Distributed System for
                                  Reliably Storing Data  . . . . . . . . . 446--454
             D. B. MacQueen and   
                 D. T. Sannella   Completeness of Proof Systems for
                                  Equational Specifications  . . . . . . . 454--461
                    M. K. Sinha   Atomic Actions and Resource Coordination
                                  Problems Having Nonunique Solutions  . . 461--471
              R. H. Perrott and   
                 D. Crookes and   
                P. Milligan and   
                 W. R. M. Purdy   A Compiler for an Array and Vector
                                  Processing Language  . . . . . . . . . . 471--478
                     S. M. Ross   Statistical Estimation of Software
                                  Reliability  . . . . . . . . . . . . . . 479--483
                G. Martella and   
                 B. Pernici and   
                F. A. Schreiber   An Availability Model for Distributed
                                  Transaction Systems  . . . . . . . . . . 483--491
                   L. M. Ni and   
                      Kai Hwang   Optimal Load Balancing in a Multiple
                                  Processor System with Many Job Classes   491--496
                      Anonymous   Call for Papers  . . . . . . . . . . . . 496--496
                      Anonymous   Beyond the Basics: A Software
                                  Publication Series for Successful
                                  Computer Professionals From the IEEE
                                  Computer Society . . . . . . . . . . . . 496--b-496--b
                      Anonymous   IEEE Computer Society Publications . . . 496--a-496--a
                      Anonymous   IEEE Computer Society  . . . . . . . . . c2--c2
                      Anonymous   \booktitleIEEE Transactions on Software
                                  Engineering --- Table of contents  . . . c1--c1

IEEE Transactions on Software Engineering
Volume SE-11, Number 6, June, 1985

               V. D. Gligor and   
                    P. A. B. Ng   Foreword . . . . . . . . . . . . . . . . 497--501
               K. P. Birman and   
               T. A. Joseph and   
                T. Raeuchle and   
                   A. El Abbadi   Implementing Fault-Tolerant Distributed
                                  Objects  . . . . . . . . . . . . . . . . 502--508
                 M. S. Mckendry   Ordering Actions for Visibility  . . . . 509--519
              A. Z. Spector and   
                 J. Butcher and   
              D. S. Daniels and   
              D. J. Duchamp and   
             J. L. Eppinger and   
              C. E. Fineman and   
                 A. Heddaya and   
                  P. M. Schwarz   Support for Distributed Transactions in
                                  the TABS Prototype . . . . . . . . . . . 520--530
                    B. Chor and   
                     B. A. Coan   A Simple and Efficient Randomized
                                  Byzantine Agreement Algorithm  . . . . . 531--539
                    K. J. Perry   Randomized Byzantine Agreement . . . . . 539--546
              O. Babao\uglu and   
                    R. Drummond   Streets of Byzantium: Network
                                  Architectures for Fast Reliable
                                  Broadcasts . . . . . . . . . . . . . . . 546--554
              R. D. Schlichting   A Technique for Estimating Performance
                                  of Fault-Tolerant Programs . . . . . . . 555--563
                N. Griffyth and   
                   J. A. Miller   Performance Modeling of Database
                                  Recovery Protocols . . . . . . . . . . . 564--572
                      Anonymous   Call for Papers  . . . . . . . . . . . . 572--572
                      Anonymous   Information for authors  . . . . . . . . 572--572
                      Anonymous   IEEE Computer Society Publications . . . 572--a-572--a
                      Anonymous   IEEE Computer Society  . . . . . . . . . c2--c2
                      Anonymous   \booktitleIEEE Transactions on Software
                                  Engineering --- Table of contents  . . . c1--c1

IEEE Transactions on Software Engineering
Volume SE-11, Number 7, July, 1985

                    P. B. Berra   Foreword Computers Come and Go But Data
                                  Go On Forever  . . . . . . . . . . . . . 573--573
             R. P. Braegger and   
               A. M. Dudler and   
                J. Rebsamen and   
                  C. A. Zehnder   Gambit: An Interactive Database Design
                                  Tool for Data Structures, Integrity
                                  Constraints, and Transactions  . . . . . 574--583
               D. B. Farmer and   
                    R. King and   
                    D. A. Myers   The Semantic Database Constructor  . . . 583--591
                    S. P. Ghosh   An Application of Statistical Databases
                                  in Manufacturing Testing . . . . . . . . 591--598
                S. D. Urban and   
                J. E. Urban and   
                 W. D. Dominick   Utilizing an Executable Specification
                                  Language for an Information System . . . 598--605
                  B. W. Wah and   
                   Yao-Nan Lien   Design of Distributed Databases on Local
                                  Computer Systems with a Multiaccess
                                  Network  . . . . . . . . . . . . . . . . 606--619
               A. M. Keller and   
                  M. W. Wilkins   On the Use of an Extended Relational
                                  Model to Handle Changing Incomplete
                                  Information  . . . . . . . . . . . . . . 620--633
                  C. Parent and   
                S. Spaccapietra   An Algebra for a General
                                  Entity-Relationship Model  . . . . . . . 634--643
                   D. Maier and   
             D. Rozenshtein and   
                       J. Stein   Representing Roles in Universal Scheme
                                  Interfaces . . . . . . . . . . . . . . . 644--652
                      Anonymous   Call for papers  . . . . . . . . . . . . 653--653
                      Anonymous   Tutorial Week Washington 1985  . . . . . 654--654
                      Anonymous   IEEE copyright form  . . . . . . . . . . 655--655
                      Anonymous   Beyond The Basics: A Software
                                  Publication Series for Successful
                                  Computer Professionals From the IEEE
                                  Computer Society . . . . . . . . . . . . 655--c-655--c
                      Anonymous   IEEE Computer Society Publications . . . 655--b-655--b
                      Anonymous   IEEE Computer Society  . . . . . . . . . c2--c2
                      Anonymous   \booktitleIEEE Transactions on Software
                                  Engineering --- Table of contents  . . . c1--c1

IEEE Transactions on Software Engineering
Volume SE-11, Number 8, August, 1985

                 V. Berzins and   
                        M. Gray   Analysis and Design in MSG.84:
                                  Formalizing Functional Specifications    657--670
                      U. H. Chi   Formal Specification of User Interfaces:
                                  A Comparison and Evaluation of Four
                                  Axiomatic Approaches . . . . . . . . . . 671--685
                     L. J. Bass   An Approach to User Specification of
                                  Interactive Display Interfaces . . . . . 686--698
                A. I. Wasserman   Extending State Transition Diagrams for
                                  the Specification of Human--Computer
                                  Interaction  . . . . . . . . . . . . . . 699--713
                        J. Gait   An Aspect of Aesthetics in
                                  Human--Computer Communications: Pretty
                                  Windows  . . . . . . . . . . . . . . . . 714--717
                  F. B. Bastani   Experiences with a Feedback Version
                                  Development Methodology  . . . . . . . . 718--723
              Shi-Kuo Chang and   
                   Wu-Lung Chan   Transformation and Verification of
                                  Office Procedures  . . . . . . . . . . . 724--734
                        A. Mili   Towards a Theory of Forward Error
                                  Recovery . . . . . . . . . . . . . . . . 735--748
             D. H. Hutchens and   
                   V. R. Basili   System Structure Analysis: Clustering
                                  with Data Bindings . . . . . . . . . . . 749--757
              A. Gabrielian and   
              L. P. McNamee and   
                  D. J. Trawick   The Qualified Function Approach to
                                  Analysis of Program Behavior and
                                  Performance  . . . . . . . . . . . . . . 758--773
                 K. Ramamritham   Synthesizing Code for Resource
                                  Controllers  . . . . . . . . . . . . . . 774--783
                V. Ambriola and   
               F. Giannotti and   
               D. Pedreschi and   
                      F. Turini   Symbolic Semantics and Program Reduction 784--794
                   C. T. Yu and   
                C. C. Chang and   
               M. Templeton and   
                   D. Brill and   
                        E. Lund   Query Processing in a Fragmented
                                  Relational Distributed System: Mermaid   795--810
              Shi-Kuo Chang and   
                 E. Jungert and   
                S. Levialdi and   
                 G. Tortora and   
                    T. Ichikawa   An Image Processing Language with
                                  Icon-Assisted Navigation . . . . . . . . 811--819
                  G. T. Wuu and   
                A. J. Bernstein   False Deadlock Detection in Distributed
                                  Systems  . . . . . . . . . . . . . . . . 820--821
                  E. H. Bersoff   Comments on ``Elements of Software
                                  Configuration Management'' . . . . . . . 822--822
               M. G. Khayat and   
               W. S. Breger and   
                M. Freiling and   
                    T. G. Lewis   Correction to ``A Concurrency Measure''  822--822
                      Anonymous   Call for papers  . . . . . . . . . . . . 823--823
                      Anonymous   Beyond the Basics: A Software
                                  Publication Series for Successful
                                  Computer Professionals From the IEEE
                                  Computer Society . . . . . . . . . . . . 823--c-823--c
                      Anonymous   IEEE Computer Society Publications . . . 823--b-823--b
                      Anonymous   Tutorial Week Washington 1985  . . . . . 823--a-823--a
                      Anonymous   IEEE Computer Society  . . . . . . . . . c2--c2
                      Anonymous   \booktitleIEEE Transactions on Software
                                  Engineering --- Table of contents  . . . c1--c1

IEEE Transactions on Software Engineering
Volume SE-11, Number 9, September, 1985

                  B. D. Shriver   An Introduction to \booktitleIEEE
                                  Software . . . . . . . . . . . . . . . . 829--829
                      Anonymous   \booktitleIEEE Software  . . . . . . . . 829--a-829--d
                 N. L. Marselos   Foreword Technical Conferences: A Window
                                  to the Future  . . . . . . . . . . . . . 830--831
                  C. Wilson and   
                L. J. Osterweil   Omega --- a Data Flow Analysis Tool for
                                  the C Programming Language . . . . . . . 832--838
                    R. Troy and   
                      R. Moawad   Assessment of Software Reliability
                                  Models . . . . . . . . . . . . . . . . . 839--849
                  S. S. Yau and   
               J. S. Collofello   Design Stability Measures for Software
                                  Maintenance  . . . . . . . . . . . . . . 849--856
                  F. B. Bastani   On the Uncertainty in the Correctness of
                                  Computer Programs  . . . . . . . . . . . 857--864
                  L. Lilien and   
                    B. Bhargava   Database Integrity Block Construct:
                                  Concepts and Design Issues . . . . . . . 865--885
          C. V. Ramamoorthy and   
                 S. T. Dong and   
                       Y. Usuda   An Implementation of an Automated
                                  Protocol Synthesizer (APS) and Its
                                  Application to the X.21 Protocol . . . . 886--908
                H. M. Sneed and   
                       A. Merey   Automated Software Quality Assurance . . 909--916
              T. J. Mc Cabe and   
               G. G. Schulmeyer   System Testing Aided by Structured
                                  Analysis: A Practical Experience . . . . 917--921
                  B. W. Wah and   
                    Chee Fen Yu   Stochastic Modeling of Branch-and-Bound
                                  Algorithms with Best-First Search  . . . 922--934
                  M. S. Karasik   Environmental Testing Techniques for
                                  Software Certification . . . . . . . . . 934--938
              B. P. Mc Cune and   
                 R. M. Tong and   
                 J. S. Dean and   
                  D. G. Shapiro   RUBRIC: A System for Rule-Based
                                  Information Retrieval  . . . . . . . . . 939--945
                   M. Azuma and   
                  T. Tabata and   
                     Y. Oki and   
                      S. Kamiya   SPD: A Humanized Documentation
                                  Technology . . . . . . . . . . . . . . . 945--953
                 M. Yoshida and   
               K. Mizumachi and   
                  A. Wakino and   
                   I. Oyake and   
                  Y. Matsushita   Time and Cost Evaluation Schemes of
                                  Multiple Copies of Data in Distributed
                                  Database Systems . . . . . . . . . . . . 954--959
                   C. T. Yu and   
              Man-Keung Siu and   
                     K. Lam and   
                     C. H. Chen   Adaptive File Allocation in Star
                                  Computer Network . . . . . . . . . . . . 959--965
              C. R. Carlson and   
                    A. K. Arora   Toward the Next Generation of Data
                                  Modeling Tools . . . . . . . . . . . . . 966--970
                C. L. Cline and   
                   H. J. Siegel   Augmenting Ada for SIMD Parallel
                                  Processing . . . . . . . . . . . . . . . 970--977
          C. W. Doerflinger and   
                   V. R. Basili   Monitoring Software Development Through
                                  Dynamic Variables  . . . . . . . . . . . 978--985
                 D. Keirsey and   
                J. Mitchell and   
                 B. Bullock and   
                T. Nussmeir and   
                    D. Y. Tseng   Autonomous Vehicle Control Using Al
                                  Techniques . . . . . . . . . . . . . . . 986--992
                      Anonymous   Call for Papers  . . . . . . . . . . . . 992--992
                      Anonymous   Beyond The Basics: A Software
                                  Publication Series for Successful
                                  Computer Professionals From the IEEE
                                  Computer Society . . . . . . . . . . . . 992--b-992--b
                      Anonymous   IEEE Computer Society Publications . . . 992--a-992--a
                      Anonymous   IEEE Computer Society  . . . . . . . . . c2--c2
                      Anonymous   \booktitleIEEE Transactions on Software
                                  Engineering --- Table of contents  . . . c1--c1

IEEE Transactions on Software Engineering
Volume SE-11, Number 10, October, 1985

                      Anonymous   Editorial  . . . . . . . . . . . . . . . 993--993
              A. H. Konstam and   
                     D. E. Wood   Software Science Applied to APL  . . . . 994--1000
              C. P. Kruskal and   
                       A. Weiss   Allocating Independent Subtasks on
                                  Parallel Processors  . . . . . . . . . . 1001--1016
                F. Panzieri and   
                     B. Randell   Interfacing UNIX to Data Communications
                                  Networks . . . . . . . . . . . . . . . . 1016--1032
                    R. Ford and   
                      K. Miller   Abstract Data Type Development and
                                  Implementation: An Example . . . . . . . 1033--1037
                  H. K. T. Wong   Foreword . . . . . . . . . . . . . . . . 1038--1039
                A. Shoshani and   
                  H. K. T. Wong   Statistical and Scientific Database
                                  Issues . . . . . . . . . . . . . . . . . 1040--1047
                M. A. Bassiouni   Data Compression in Scientific and
                                  Statistical Databases  . . . . . . . . . 1047--1058
           S. N. Khoshafian and   
                D. M. Bates and   
                  D. J. De Witt   Efficient Support of Statistical
                                  Operations . . . . . . . . . . . . . . . 1058--1070
               G. Ozsoyoglu and   
                Z. M. Ozsoyoglu   Statistical Database Query Languages . . 1071--1081
                     N. C. Rowe   Antisampling for Estimation: An Overview 1081--1091
            S. F. Lundstrom and   
             E. E. Swartzlander   Foreword Advances in Distributed
                                  Computing Systems  . . . . . . . . . . . 1092--1096
              A. L. P. Chen and   
                    V. O. K. Li   An Optimal Algorithm for Processing
                                  Distributed Star Queries . . . . . . . . 1097--1107
                   D. M. Topkis   Concurrent Broadcast for Information
                                  Dissemination  . . . . . . . . . . . . . 1107--1112
                    J. P. Huang   Modeling of Software Partition for
                                  Distributed Real-Time Applications . . . 1113--1126
               Kwei-Jay Lin and   
                   J. D. Gannon   Atomic Remote Procedure Call . . . . . . 1126--1135
               B. Szymanski and   
                   Yuan Shi and   
                   N. S. Prywes   Synchronized Distributed Termination . . 1136--1140
                J. A. Stankovic   Stability and Distributed Scheduling
                                  Algorithms . . . . . . . . . . . . . . . 1141--1152
                   L. M. Ni and   
               Chong-Wei Xu and   
                 T. B. Gendreau   A Distributed Drafting Algorithm for
                                  Load Balancing . . . . . . . . . . . . . 1153--1161
                K. A. Lantz and   
              W. I. Nowicki and   
                  A. M. Theimer   An Empirical Study of Distributed
                                  Application Performance  . . . . . . . . 1162--1174
                A. P. Sheth and   
                 A. Singhal and   
                      M. T. Liu   An Analysis of the Effect of Network
                                  Parameters on the Performance of
                                  Distributed Database Systems . . . . . . 1174--1184
          C. S. Raghavendra and   
                      S. Hariri   Reliability Optimization in the Design
                                  of Distributed Systems . . . . . . . . . 1184--1193
                    S. M. Shatz   Post-Failure Reconfiguration of CSP
                                  Programs . . . . . . . . . . . . . . . . 1193--1202
               A. Thomasian and   
                      P. F. Bay   Integrated Performance Models for
                                  Distributed Processing in Computer
                                  Communication Networks . . . . . . . . . 1203--1216
                        K. Garg   An Approach to Performance Specification
                                  of Communication Protocols Using Timed
                                  Petri Nets . . . . . . . . . . . . . . . 1216--1225
                     M. T. Ozsu   Modeling and Analysis of Distributed
                                  Database Concurrency Control Algorithms
                                  Using an Extended Petri Net Formalism    1225--1240
                M. G. Gouda and   
                   Hui-Seng Lee   Proving Liveness and Termination of
                                  Systolic Arrays Using Communicating
                                  Finite State Machines  . . . . . . . . . 1240--1251
                      Anonymous   Call for papers  . . . . . . . . . . . . 1252--1252
                      Anonymous   IEEE Computer Society Publications . . . 1252--a-1252--a
                      Anonymous   \booktitleIEEE Transactions on Software
                                  Engineering --- Table of contents  . . . c1--1252
                      Anonymous   IEEE Computer Society  . . . . . . . . . c2--c2

IEEE Transactions on Software Engineering
Volume SE-11, Number 11, November, 1985

                      J. Mostow   Foreword What is AI? And What Does It
                                  Have to Do with Software Engineering?    1253--1256
                      R. Balzer   A 15 Year Perspective on Automatic
                                  Programming  . . . . . . . . . . . . . . 1257--1268
                   S. F. Fickas   Automating the Transformational
                                  Development of Software  . . . . . . . . 1268--1277
                D. R. Smith and   
                G. B. Kotik and   
                 S. J. Westfold   Research on Knowledge-Based Software
                                  Environments at Kestrel Institute  . . . 1278--1295
                   R. C. Waters   The Programmer's Apprentice: A Session
                                  with KBEmacs . . . . . . . . . . . . . . 1296--1320
                  D. R. Barstow   Domain-Specific Automatic Programming    1321--1336
                  R. Neches and   
             W. R. Swartout and   
                    J. D. Moore   Enhanced Maintenance and Explanation of
                                  Expert Systems Through Explicit Models
                                  of Their Development . . . . . . . . . . 1337--1351
                 B. Adelson and   
                     E. Soloway   The Role of Domain Experience in
                                  Software Design  . . . . . . . . . . . . 1351--1360
                        E. Kant   Understanding and Automating Algorithm
                                  Design . . . . . . . . . . . . . . . . . 1361--1374
               D. M. Steier and   
                        E. Kant   The Roles of Execution and Analysis in
                                  Algorithm Design . . . . . . . . . . . . 1375--1386
                       J. Doyle   Expert Systems and the ``Myth'' of
                                  Symbolic Reasoning . . . . . . . . . . . 1386--1390
             P. A. Subrahmanyam   The ``Software Engineering'' of Expert
                                  Systems: Is Prolog Appropriate?  . . . . 1391--1400
                   D. G. Bobrow   If Prolog is the Answer, What is the
                                  Question? or What it Takes to Support AI
                                  Programming Paradigms  . . . . . . . . . 1401--1408
                      Anonymous   Call for Papers  . . . . . . . . . . . . 1408--1408
                      Anonymous   IEEE Computer Society Publications . . . 1408--a-1408--a
                      Anonymous   IEEE Computer Society  . . . . . . . . . c2--c2
                      Anonymous   \booktitleIEEE Transactions on Software
                                  Engineering --- Table of contents  . . . c1--c1

IEEE Transactions on Software Engineering
Volume SE-11, Number 12, December, 1985

                 A. L. Goel and   
                  F. B. Bastani   Foreword Software Reliability  . . . . . 1409--1410
                      Anonymous   List of referees . . . . . . . . . . . . 1410--1410
                     A. L. Goel   Software Reliability Models:
                                  Assumptions, Limitations, and
                                  Applicability  . . . . . . . . . . . . . 1411--1423
                     K. Okumoto   A Statistical Method for Software
                                  Quality Control  . . . . . . . . . . . . 1424--1430
                  S. Yamada and   
                       S. Osaki   Software Reliability Growth Modeling:
                                  Models and Applications  . . . . . . . . 1431--1437
                 R. K. Iyer and   
                 D. J. Rossetti   Effect of System Workload on Operating
                                  System Reliability: A Study on IBM 3081  1438--1448
                   J. P. Cavano   Toward High Confidence Software  . . . . 1449--1455
         N. D. Singpurwalla and   
                       R. Soyer   Assessing (Software) Reliability Growth
                                  Using a Random Coefficient
                                  Autoregressive Process and Its
                                  Ramifications  . . . . . . . . . . . . . 1456--1464
                   W. S. Jewell   Bayesian Extensions to a Basic Model of
                                  Software Reliability . . . . . . . . . . 1465--1471
                     S. M. Ross   Software Reliability: The Stopping Rule
                                  Problem  . . . . . . . . . . . . . . . . 1472--1476
           D. J. Richardson and   
                   L. A. Clarke   Partition Analysis: A Method Combining
                                  Testing and Verification . . . . . . . . 1477--1490
                   A. Avizienis   The $N$-Version Approach to
                                  Fault-Tolerant Software  . . . . . . . . 1491--1501
                T. Anderson and   
              P. A. Barrett and   
            D. N. Halliwell and   
                 M. R. Moulding   Software Fault Tolerance: An Evaluation  1502--1510
             D. E. Eckhardt and   
                      L. D. Lee   A Theoretical Basis for the Analysis of
                                  Multiversion Software Subject to
                                  Coincident Errors  . . . . . . . . . . . 1511--1517
                      Anonymous   Call for Papers  . . . . . . . . . . . . 1517--1517
                      Anonymous   Call for Papers  . . . . . . . . . . . . 1517--1517
                      Anonymous   1985 Index \booktitleIEEE Transactions
                                  on Software Engineering Vol. SE-11 . . . 1517--1517
                      Anonymous   IEEE Computer Society Publications . . . 1517--l-1517--l
                      Anonymous   IEEE Finding Your Way  . . . . . . . . . 1517--j-1517--j
                      Anonymous   IEEE Computer Society  . . . . . . . . . c2--c2
                      Anonymous   \booktitleIEEE Transactions on Software
                                  Engineering --- Table of contents  . . . c1--c1


IEEE Transactions on Software Engineering
Volume SE-12, Number 1, January, 1986

                      Anonymous   Contents . . . . . . . . . . . . . . . . 1--1
                      Anonymous   IEEE copyright form  . . . . . . . . . . 1--2
                 A. L. Goel and   
                  F. B. Bastani   Foreword software reliability  . . . . . 1--2
               P. A. Currit and   
                    M. Dyer and   
                    H. D. Mills   Certifying the reliability of software   3--11
                   D. R. Miller   Exponential order statistic models of
                                  software reliability growth  . . . . . . 12--24
                   F. W. Scholz   Software reliability modeling and
                                  analysis . . . . . . . . . . . . . . . . 25--31
                  U. Sumita and   
                      Y. Masuda   Analysis of software
                                  availability/reliability under the
                                  influence of hardware failures . . . . . 32--41
             V. K. P. Kumar and   
                  S. Hariri and   
              C. S. Raghavendra   Distributed program reliability analysis 42--50
                   H. Hecht and   
                       M. Hecht   Software reliability in the system
                                  context  . . . . . . . . . . . . . . . . 51--58
                  P. Jalote and   
                 R. H. Campbell   Atomic actions for fault-tolerance using
                                  CSP  . . . . . . . . . . . . . . . . . . 59--68
                   D. J. Taylor   Concurrency and forward recovery in
                                  atomic actions . . . . . . . . . . . . . 69--78
                     L. Mancini   Modular redundancy in a message passing
                                  system . . . . . . . . . . . . . . . . . 79--86
            J. S. Upadhyaya and   
                   K. K. Saluja   A watchdog processor based general
                                  rollback technique with multiple retries 87--95
               J. C. Knight and   
                  N. G. Leveson   An experimental evaluation of the
                                  assumption of independence in
                                  multiversion programming . . . . . . . . 96--109
                   J. R. Dunham   Experiments in software reliability:
                                  Life-critical applications . . . . . . . 110--123
                    I. J. Hayes   Specification directed module testing    124--133
               H. Tsubotani and   
                  N. Monden and   
                  M. Tanaka and   
                    T. Ichikawa   A high level language-based computing
                                  environment to support production and
                                  execution of reliable programs . . . . . 134--146
            A. I. Wasserman and   
              P. A. Pircher and   
                 D. T. Shewmake   Building reliable interactive
                                  information systems  . . . . . . . . . . 147--156
                R. E. Strom and   
                      S. Yemini   Typestate: A programming language
                                  concept for enhancing software
                                  reliability  . . . . . . . . . . . . . . 157--171
                 Z. L. Lichtman   Generation and consistency checking of
                                  design and program structures  . . . . . 172--181
                      Anonymous   Call for papers  . . . . . . . . . . . . 182--182
                      Anonymous   [Inside front cover] . . . . . . . . . . c2--c2

IEEE Transactions on Software Engineering
Volume SE-12, Number 2, February, 1986

                      Anonymous   Ada --- applications and environments    1--1
                      Anonymous   Call for papers  . . . . . . . . . . . . 1--1
             G. D. Bergland and   
                        P. Zave   Guest Editors' prologue special issue on
                                  software design methods  . . . . . . . . 185--191
                H. D. Mills and   
                   R. C. Linger   Data structured programming: Program
                                  design without arrays and pointers . . . 192--197
                     P. T. Ward   The transformation schema: An extension
                                  of the data flow diagram to represent
                                  control and timing . . . . . . . . . . . 198--210
                       G. Booch   Object-oriented development  . . . . . . 211--221
                  J. R. Cameron   An overview of JSD . . . . . . . . . . . 222--240
                   P. Henderson   Functional programming, formal
                                  specification, and rapid prototyping . . 241--250
               D. L. Parnas and   
                 P. C. Clements   A rational design process: How and why
                                  to fake it . . . . . . . . . . . . . . . 251--257
              H. J. Barnard and   
                 R. F. Metz and   
                    A. L. Price   A recommended practice for describing
                                  software designs: IEEE standards project
                                  1016 . . . . . . . . . . . . . . . . . . 258--263
                 D. N. Card and   
               V. E. Church and   
                  W. W. Agresti   An empirical study of software design
                                  practices  . . . . . . . . . . . . . . . 264--271
                     L. S. Levy   A metaprogramming method and its
                                  economic justification . . . . . . . . . 272--277
              G. S. Avrunin and   
               L. K. Dillon and   
              J. C. Wileden and   
                   W. E. Riddle   Constrained expressions: Adding analysis
                                  capabilities to design methods for
                                  concurrent software systems  . . . . . . 278--292
                  G. Estrin and   
              R. S. Fenchel and   
               R. R. Razouk and   
                   M. K. Vernon   SARA (System ARchitects Apprentice):
                                  Modeling, analysis, and simulation
                                  support for design of concurrent systems 293--311
                    P. Zave and   
                      W. Schell   Salient features of an executable
                                  specification language and its
                                  environment  . . . . . . . . . . . . . . 312--325
            A. I. Wasserman and   
              P. A. Pircher and   
             D. T. Shewmake and   
                  M. L. Kersten   Developing interactive information
                                  systems with the User Software
                                  Engineering methodology  . . . . . . . . 326--345
                   G. Bruno and   
                   G. Marchetto   Process-translatable Petri nets for the
                                  rapid prototyping of process control
                                  systems  . . . . . . . . . . . . . . . . 346--357
                J. S. Tseng and   
               B. Szymanski and   
                     Y. Shi and   
                   N. S. Prywes   Real-time software life cycle with the
                                  model system . . . . . . . . . . . . . . 358--373
                      Anonymous   Call for papers  . . . . . . . . . . . . 374--374

IEEE Transactions on Software Engineering
Volume SE-12, Number 3, March, 1986

                      Anonymous   Call for papers  . . . . . . . . . . . . 1--1
                      Anonymous   Call for papers  . . . . . . . . . . . . 1--1
                      Anonymous   Call for papers  . . . . . . . . . . . . 1--1
            S. Rutenstreich and   
                   W. E. Howden   Two-dimensional program design . . . . . 377--384
                  K. Schwan and   
                    A. K. Jones   Flexible software development for
                                  multiple computer systems  . . . . . . . 385--401
                  F. J. Polster   Reuse of software through generation of
                                  partial systems  . . . . . . . . . . . . 402--416
                   G. D. Kimura   A structure editor for abstract document
                                  objects  . . . . . . . . . . . . . . . . 417--435
                 C. H. C. Leung   Dynamic storage fragmentation and file
                                  deterioration  . . . . . . . . . . . . . 436--441
                  A. Moitra and   
                  S. S. Iyengar   Derivation of a parallel algorithm for
                                  balancing binary trees . . . . . . . . . 442--449
               H. G. Perros and   
                      T. Altiok   Approximate analysis of open networks of
                                  queues with blocking: Tandem
                                  configurations . . . . . . . . . . . . . 450--461
                    M. K. Sinha   Commutable transactions and the
                                  time\_pad synchronization mechanism for
                                  distributed systems  . . . . . . . . . . 462--476
                K. J. Perry and   
                       S. Toueg   Distributed agreement in the presence of
                                  processor and communication faults . . . 477--482
               B. Indurkhya and   
                H. S. Stone and   
                    L. Xi-Cheng   Optimal partitioning of randomly
                                  generated distributed programs . . . . . 483--495
                  J. E. Gaffney   The impact on software development costs
                                  of using HOL's . . . . . . . . . . . . . 496--499
                   L. M. Ni and   
                       K. Hwang   Correction to ``Optimal load balancing
                                  in a multiple processor system with many
                                  job classes''  . . . . . . . . . . . . . 500--500
                      Anonymous   Call for papers  . . . . . . . . . . . . 502--502

IEEE Transactions on Software Engineering
Volume SE-12, Number 4, April, 1986

                      Anonymous   Call for papers  . . . . . . . . . . . . 1--1
                 G. S. Hura and   
                   H. Singh and   
                    N. K. Nanda   Some design aspects of databases through
                                  Petri net modeling . . . . . . . . . . . 505--510
                M. Tsuchiya and   
              M. P. Mariani and   
                     J. D. Brom   Distributed database management model
                                  and validation . . . . . . . . . . . . . 511--520
                       A. Ha\'c   A decomposition solution to a queueing
                                  network model of a distributed file
                                  system with dynamic locking  . . . . . . 521--530
                   N. Natarajan   A distributed scheme for detecting
                                  communication deadlocks  . . . . . . . . 531--537
                  C. Batini and   
                E. Nardelli and   
                    R. Tamassia   A layout algorithm for data flow
                                  diagrams . . . . . . . . . . . . . . . . 538--546
                 F. Baiardi and   
            N. De Francesco and   
                     G. Vaglini   Development of a debugger for a
                                  concurrent language  . . . . . . . . . . 547--553
              L. M. Patnaik and   
                     K. V. Iyer   Load-leveling in fault-tolerant
                                  distributed computing systems  . . . . . 554--560
                   G. Balbo and   
               S. C. Bruell and   
                      S. Ghanta   Combining queueing network and
                                  Generalized Stochastic Petri Net models
                                  for the analysis of some software
                                  blocking phenomena . . . . . . . . . . . 561--576
              B. K. Hillyer and   
                 D. E. Shaw and   
                       A. Nigam   NON-VON's performance on certain
                                  database benchmarks  . . . . . . . . . . 577--583
                M. Trachtenberg   Validating Halstead's theory with System
                                  3 data . . . . . . . . . . . . . . . . . 584--584
                       M. Lipow   Comments on ``Estimating the number of
                                  faults in code'' and two corrections to
                                  published data . . . . . . . . . . . . . 584--585
                      Anonymous   Call for papers  . . . . . . . . . . . . 586--587

IEEE Transactions on Software Engineering
Volume SE-12, Number 5, May, 1986

                      Anonymous   Editorial  . . . . . . . . . . . . . . . 589--589
               D. M. Yellin and   
            E. M. M. Mueckstein   The automatic inversion of attribute
                                  grammars . . . . . . . . . . . . . . . . 590--599
             T. V. Lakshman and   
                 A. K. Agrawala   Efficient decentralized consensus
                                  protocols  . . . . . . . . . . . . . . . 600--607
                 W. E. Hall and   
                   S. H. Zweben   The cloze procedure and software
                                  comprehensibility measurement  . . . . . 608--623
                T. Ichikawa and   
                    M. Hirakawa   ARES: A relational database with the
                                  capability of performing flexible
                                  interpretation of queries  . . . . . . . 624--634
             K. Ramamritham and   
                 D. Stemple and   
               D. A. Briggs and   
                      S. Vinter   Privilege transfer and revocation in a
                                  port-based system  . . . . . . . . . . . 635--648
              B. Belkhouche and   
                    J. E. Urban   Direct implementation of abstract data
                                  types from abstract specifications . . . 649--661
                D. L. Eager and   
             E. D. Lazowska and   
                    J. Zahorjan   Adaptive load sharing in homogeneous
                                  distributed systems  . . . . . . . . . . 662--675
                      Anonymous   Call for papers  . . . . . . . . . . . . 676--676

IEEE Transactions on Software Engineering
Volume SE-12, Number 6, June, 1986

                      Anonymous   Call for papers  . . . . . . . . . . . . 1--1
                      Anonymous   Editorial  . . . . . . . . . . . . . . . 677--677
                     D. Ferrari   Considerations on the insularity of
                                  performance evaluation . . . . . . . . . 678--683
                     J. N. Gray   An approach to decentralized computer
                                  systems  . . . . . . . . . . . . . . . . 684--692
               E. W. Martin and   
                 R. A. De Millo   Operational survivability in gracefully
                                  degrading distributed processing systems 693--704
                   R. F. Mathis   The last 10 percent  . . . . . . . . . . 705--712
                  S. S. Yau and   
                  J. J. P. Tsai   A survey of software design techniques   713--721
                      Anonymous   Call for papers  . . . . . . . . . . . . 722--723

IEEE Transactions on Software Engineering
Volume SE-12, Number 7, July, 1986

                      Anonymous   Call for papers  . . . . . . . . . . . . 1--1
                      Anonymous   Foreword . . . . . . . . . . . . . . . . 725--725
                    H. A. Simon   Whether software engineering needs to be
                                  artificially intelligent . . . . . . . . 726--732
               V. R. Basili and   
                R. W. Selby and   
                 D. H. Hutchens   Experimentation in software engineering  733--743
                    M. E. Fagan   Advances in software inspections . . . . 744--751
                 A. T. Goldberg   Knowledge-based programming: A survey of
                                  program design and construction
                                  techniques . . . . . . . . . . . . . . . 752--768
          C. V. Ramamoorthy and   
                    V. Garg and   
                     A. Prakash   Programming in the large . . . . . . . . 769--783
                   H. Weber and   
                       H. Ehrig   Specification of modular systems . . . . 784--798
                      Anonymous   Call for papers  . . . . . . . . . . . . 799--799

IEEE Transactions on Software Engineering
Volume SE-12, Number 8, August, 1986

               Tak-Sun Yuen and   
           David Huang-Chang Du   Dynamic file structure for partial match
                                  retrieval based on overflow bucket
                                  sharing  . . . . . . . . . . . . . . . . 801--810
             R. H. Campbell and   
                     B. Randell   Error recovery in asynchronous systems   811--826
               T. P. Blumer and   
                    D. P. Sidhu   Mechanical verification and automatic
                                  implementation of communication
                                  protocols  . . . . . . . . . . . . . . . 827--843
             C. M. Woodside and   
                 S. K. Tripathi   Optimal allocation of file servers in a
                                  local network environment  . . . . . . . 844--848
                E. Horqwitz and   
               R. C. Williamson   SODOS: A software documentation support
                                  environment --- Its definition . . . . . 849--859
                   B. Meandzija   A formal method for composing a network
                                  command language . . . . . . . . . . . . 860--865
            R. P. Trueblood and   
                    A. Sengupta   Dynamic analysis of the effects access
                                  rule modifications have upon security    866--870
                  K. C. Tai and   
                    A. L. Tharp   A comparison of computed chaining to
                                  predictors . . . . . . . . . . . . . . . 870--874
               D. L. Parnas and   
                 P. C. Clements   Correction to ``A rational design
                                  process: How and why to fake it''  . . . 874--874
                      Anonymous   Call for papers  . . . . . . . . . . . . 875--876

IEEE Transactions on Software Engineering
Volume SE-12, Number 9, September, 1986

                 S. Bologna and   
                  N. G. Leveson   Foreword reliability and safety in
                                  real-time systems  . . . . . . . . . . . 877--878
             B. Auernheimer and   
                 R. A. Kemmerer   RT-ASLAN: A specification language for
                                  real-time systems  . . . . . . . . . . . 879--889
                F. Jahanian and   
                   A. K. L. Mok   Safety analysis of timing properties in
                                  real-time systems  . . . . . . . . . . . 890--904
                  P. G. Neumann   On hierarchical design of computer
                                  systems for critical applications  . . . 905--920
              A. M. Tyrrell and   
                  D. J. Holding   Design of reliable software in
                                  distributed systems using the
                                  conversation scheme  . . . . . . . . . . 921--928
               P. G. Bishop and   
                  D. G. Esp and   
                  M. Barnes and   
               P. Humphreys and   
                   G. Dahll and   
                       J. Lahti   PODS --- A project on diverse software   929--940
               E. Kligerman and   
                 A. D. Stoyenko   Real-Time Euclid: A language for
                                  reliable real-time systems . . . . . . . 941--949
          A. A. Abdel-Ghaly and   
                 P. Y. Chan and   
                  B. Littlewood   Evaluation of competing software
                                  reliability predictions  . . . . . . . . 950--967
                    R. Troy and   
                      Y. Romain   A statistical methodology for the study
                                  of the software failure process and its
                                  application to the ARGOS center  . . . . 968--978
                       T. Downs   Extensions to an approach to the
                                  modeling of software testing with some
                                  performance comparisons  . . . . . . . . 979--987
           R. E. Bloomfield and   
                P. K. D. Froome   The application of formal methods to the
                                  assessment of high integrity software    988--993
                      Anonymous   Call for papers  . . . . . . . . . . . . 994--995
                     B. Dhillon   IASTED conference on reliability and
                                  quality control  . . . . . . . . . . . . 996--996

IEEE Transactions on Software Engineering
Volume SE-12, Number 10, October, 1986

                   W. E. Howden   A functional approach to program testing
                                  and analysis . . . . . . . . . . . . . . 997--1005
              D. W. Cornell and   
                 D. M. Dias and   
                       P. S. Yu   On multisystem coupling through function
                                  request shipping . . . . . . . . . . . . 1006--1017
                     D. Towsley   Allocating programs containing branches
                                  and loops within a multiple processor
                                  system . . . . . . . . . . . . . . . . . 1018--1024
               A. E. Conway and   
                N. D. Georganas   Decomposition and aggregation by class
                                  in closed queueing networks  . . . . . . 1025--1040
                 C. M. Woodside   Controllability of computer performance
                                  tradeoffs obtained using
                                  controlled-share queue schedulers  . . . 1041--1048

IEEE Transactions on Software Engineering
Volume SE-12, Number 11, November, 1986

                      H. Kameda   The gains from computer communication    1049--1055
              D. W. Stemple and   
               S. T. Vinter and   
                 K. Ramamritham   Functional addressing in Gutenberg:
                                  Interprocess communication without
                                  process identifiers  . . . . . . . . . . 1056--1066
             A. B. Sheltzer and   
                    G. J. Popek   Internet Locus: Extending transparency
                                  to an Internet environment . . . . . . . 1067--1075
                E. Horowitz and   
               R. C. Williamson   SODOS: A software documentation support
                                  environment --- Its use  . . . . . . . . 1076--1087
                   T. Y. Cheung   On the projection method for protocol
                                  verification . . . . . . . . . . . . . . 1088--1089
             A. L. Liestman and   
                 R. H. Campbell   A fault-tolerant scheduling problem  . . 1089--1095
                       S. Kundu   The call-return tree and its application
                                  to program performance analysis  . . . . 1096--1098
                 H. Arisawa and   
                       T. Miura   On the properties of extended inclusion
                                  dependences  . . . . . . . . . . . . . . 1098--1101
                      Anonymous   Call for papers  . . . . . . . . . . . . 1102--1103
                     B. Dhillon   IASTED conference on reliability and
                                  quality control  . . . . . . . . . . . . 1104--1104

IEEE Transactions on Software Engineering
Volume SE-12, Number 12, December, 1986

                      Anonymous   Advance program  . . . . . . . . . . . . 1--1
                      Anonymous   Data engineering registration form . . . 1--1
                      Anonymous   Author index . . . . . . . . . . . . . . 1--7
                      Anonymous   Editorial  . . . . . . . . . . . . . . . 1105--1105
                    S. P. Ghosh   Statistical relational tables for
                                  statistical database management  . . . . 1106--1116
            A. N. Habermann and   
                      D. Notkin   Gandalf: Software development
                                  environments . . . . . . . . . . . . . . 1117--1127
                  E. J. Weyuker   Axiomatizing software test data adequacy 1128--1138
            D. W. Leinbaugh and   
                   M. R. Yamini   Guaranteed response times in a
                                  distributed hard-real-time environment   1139--1144
                     F. Stetter   Comments on ``Number of faults per line
                                  of code''  . . . . . . . . . . . . . . . 1145--1145
                      Anonymous   Call for papers  . . . . . . . . . . . . 1153--1154


IEEE Transactions on Software Engineering
Volume SE-13, Number 1, January, 1987

                F. Cristian and   
                       D. Skeen   Foreword Special Issue on Distributed
                                  Systems  . . . . . . . . . . . . . . . . 1--2
                      Anonymous   List of referees . . . . . . . . . . . . 2--2
                   I. Cidon and   
                J. M. Jaffe and   
                        M. Sidi   Local Distributed Deadlock Detection by
                                  Cycle Detection and Clustering . . . . . 3--14
                W. K. Fuchs and   
                Kun-Lung Wu and   
                  J. A. Abraham   Companson and Diagnosis of Large
                                  Replicated Files . . . . . . . . . . . . 15--22
                     R. Koo and   
                       S. Toueg   Checkpointing and Rollback-Recovery for
                                  Distributed Systems  . . . . . . . . . . 23--31
               F. C. H. Lin and   
                   R. M. Keller   The Gradient Model Load Balancing Method 32--38
                S. K. Sarin and   
                    N. A. Lynch   Discarding Obsolete Information in a
                                  Replicated Database System . . . . . . . 39--47
                    D. B. Terry   Caching Hints in Distributed Systems . . 48--54
                    W. E. Weihl   Distributed Version Management for
                                  Read-Only Actions  . . . . . . . . . . . 55--64
                   A. Black and   
              N. Hutchinson and   
                     E. Jul and   
                    H. Levy and   
                      L. Carter   Distribution and Abstract Types in
                                  Emerald  . . . . . . . . . . . . . . . . 65--76
                  P. B. Gibbons   A Stub Generator for Multilanguage RPC
                                  in Heterogeneous Environments  . . . . . 77--87
                    M. L. Scott   Language Support for Loosely Coupled
                                  Distributed Programs . . . . . . . . . . 88--103
              G. R. Andrews and   
          R. D. Schlichting and   
                   R. Hayes and   
                T. D. M. Purdin   The Design of the Saguaro Distributed
                                  Operating System . . . . . . . . . . . . 104--118
                      Anonymous   Information for authors  . . . . . . . . 119--119
                      Anonymous   IEEE copyright form  . . . . . . . . . . 119--119
                      Anonymous   The Third International Conference on
                                  Data Engineering . . . . . . . . . . . . 119--119
                      Anonymous   IEEE Computer Society Publications . . . 119--f-119--f
                      Anonymous   The One Leveraged Investment With a
                                  Guaranteed Return  . . . . . . . . . . . 119--d-119--e
                      Anonymous   IEEE Computer Society  . . . . . . . . . c2--c2
                      Anonymous   \booktitleIEEE Transactions on Software
                                  Engineering --- Table of contents  . . . c1--c1

IEEE Transactions on Software Engineering
Volume SE-13, Number 2, February, 1987

                      Anonymous   Guest Editors' Note  . . . . . . . . . . 125--128
              D. E. Denning and   
                  S. G. Akl and   
                 M. Heckman and   
                 T. F. Lunt and   
             M. Morgenstern and   
              P. G. Neumann and   
                   R. R. Schell   Views for Multilevel Database Security   129--140
                J. T. Haigh and   
                    W. D. Young   Extending the Noninterference Version of
                                  MLS for SAT  . . . . . . . . . . . . . . 141--150
              J. D. Halpern and   
                    S. Owre and   
                 N. Proctor and   
                   W. F. Wilson   Muse --- a Computer Assisted
                                  Verification System  . . . . . . . . . . 151--156
                J. T. Haigh and   
             R. A. Kemmerer and   
                  J. Mchugh and   
                    W. D. Young   An Experience Using Two Covert Channel
                                  Analysis Techniques on a Real System
                                  Design . . . . . . . . . . . . . . . . . 157--168
               V. D. Gligor and   
       C. S. Chandersekaran and   
              Wen-Der Jiang and   
                   A. Johri and   
          G. L. Luckenbaugh and   
                    L. E. Reich   A New Security Testing Method and Its
                                  Application to the Secure Xenix Kernel   169--183
                    D. M. Berry   Towards a Formal Basis for the Formal
                                  Development Method and the Ina Jo
                                  Specification Language . . . . . . . . . 184--201
                 R. Y. Kain and   
                 C. E. Landwehr   On Access Checking in Capability-Based
                                  Systems  . . . . . . . . . . . . . . . . 202--207
               V. D. Gligor and   
       C. S. Chandersekaran and   
              R. S. Chapman and   
             L. J. Dotterer and   
                M. S. Hetch and   
              Wen-Der Jiang and   
                   A. Johri and   
          G. L. Luckenbaugh and   
                   N. Vasudevan   Design and Implementation of Secure
                                  Xenix  . . . . . . . . . . . . . . . . . 208--221
                  D. E. Denning   An Intrusion-Detection Model . . . . . . 222--232
                  D. M. Nessett   Factors Affecting Distributed System
                                  Security . . . . . . . . . . . . . . . . 233--248
                      D. Estrin   Controls for Interorganization Networks  249--261
                J. H. Moore and   
                  G. J. Simmons   Cycle Structure of the DES for Keys
                                  Having Palindromic (or Antipalindromic)
                                  Sequences of Round Keys  . . . . . . . . 262--273
               J. K. Millen and   
                S. C. Clark and   
                 S. B. Freedman   The Interrogator: Protocol Secuity
                                  Analysis . . . . . . . . . . . . . . . . 274--288
                 C. Meadows and   
                    D. Mutchler   Matching Secrets in the Absence of a
                                  Continuously Available Trusted Authority 289--292
                  C. G. Girling   Covert Channels in LAN's . . . . . . . . 292--296
                      Anonymous   9th Annual International Conference on
                                  Software Engineering . . . . . . . . . . 296--296
                      Anonymous   Call for Papers  . . . . . . . . . . . . 296--296
                      Anonymous   IEEE Computer Society Publications . . . 296--e-296--e
                      Anonymous   IEEE Computer Society  . . . . . . . . . c2--c2
                      Anonymous   \booktitleIEEE Transactions on Software
                                  Engineering --- Table of contents  . . . c1--c1

IEEE Transactions on Software Engineering
Volume SE-13, Number 3, March, 1987

             N. F. Schneidewind   Introduction to the Special Section on
                                  Software Maintenance . . . . . . . . . . 301--301
                      Anonymous   List of referees . . . . . . . . . . . . 302--302
             N. F. Schneidewind   The State of Software Maintenance  . . . 303--310
                 S. Bendifallah   Understanding Software Maintenance Work  311--323
           K. Narayanaswamy and   
                     W. Scacchi   Maintaining Configurations of Evolving
                                  Software Systems . . . . . . . . . . . . 324--334
                  D. Kafura and   
                    G. R. Reddy   The Use of Software Complexity Metrics
                                  in Software Maintenance  . . . . . . . . 335--343
                  H. D. Rombach   A Controlled Experiment on the Impact of
                                  Software Structure on Maintainability    344--354
                  S. S. Yau and   
                     J. J. Tsai   Knowledge Representation of Software
                                  Component Interconnection Information
                                  for Large-Scale Software Modifications   355--361
                     R. B. Bunt   Foreword . . . . . . . . . . . . . . . . 362--362
               V. F. Nicola and   
             V. G. Kulkarni and   
                  K. S. Trivedi   Queueing Analysis of Fault-Tolerant
                                  Computer Systems . . . . . . . . . . . . 363--375
               K. C. Sevick and   
                  M. J. Johnson   Cycle Time Properties of the FDDI Token
                                  Ring Protocol  . . . . . . . . . . . . . 376--385
              N. G. Leveson and   
                   J. L. Stolzy   Safety Analysis Using Petri Nets . . . . 386--397
                    Y. K. Dalal   A Distributed Algorithm for Constructing
                                  Minimal Spanning Trees . . . . . . . . . 398--405
                      Anonymous   Call for papers  . . . . . . . . . . . . 406--407
                      Anonymous   Beyond The Basics: A Software
                                  Publication Series for Successful
                                  Computer Professionals From the IEEE
                                  Computer Society . . . . . . . . . . . . 407--c-407--c
                      Anonymous   IEEE Computer Society Publications . . . 407--b-407--b
                      Anonymous   The Information Edge . . . . . . . . . . 407--a-407--a
                      Anonymous   IEEE Computer Society  . . . . . . . . . c2--c2
                      Anonymous   \booktitleIEEE Transactions on Software
                                  Engineering --- Table of contents  . . . c1--c1

IEEE Transactions on Software Engineering
Volume SE-13, Number 4, April, 1987

              C. Boksenbaum and   
                    M. Cart and   
                  J. Ferrie and   
                     J. F. Pons   Concurrent Certifications by Intervals
                                  of Timestamps in Distributed Database
                                  Systems  . . . . . . . . . . . . . . . . 409--419
                 F. Y. Chin and   
               K. V. S. Ramarao   An Information-Based Model for
                                  Failure-Handling in Distributed Database
                                  Systems  . . . . . . . . . . . . . . . . 420--431
                     B. I. Blum   A Paradigm for Developing Information
                                  Systems  . . . . . . . . . . . . . . . . 432--439
           R. T. Mittermeir and   
                      M. Oppitz   Software Bases for the Flexible
                                  Composition of Application Systems . . . 440--460
               K. Matsumura and   
                H. Mizutani and   
                        M. Arai   An Application of Structural Modeling to
                                  Software Requirements Analysis and
                                  Design . . . . . . . . . . . . . . . . . 461--471
                     V. Rajlich   Refinement Methodology for Ada . . . . . 472--478
                 H. W. Robb and   
              H. R. Weistroffer   Performance Criteria for Constrained
                                  Nonlinear Programming Codes  . . . . . . 479--489
                    F. G. Pagan   Program Structure Charts for Applicative
                                  Languages  . . . . . . . . . . . . . . . 490--493
              B. Steinholtz and   
                      K. Walden   Automatic Identification of Software
                                  System Differences . . . . . . . . . . . 493--497
               Sun Zhongxiu and   
                      Li Xining   CSM: A Distributed Programming Language  497--500
             G. v. Bochmann and   
                   J. P. Verjus   Some Comments on ``Transition-Oriented''
                                  Versus ``Structured'' Specification of
                                  Distributed Algorithms and Protocols . . 501--505
                      Anonymous   Call for papers  . . . . . . . . . . . . 506--506
                      Anonymous   In this issue  . . . . . . . . . . . . . 506--506
                      Anonymous   Beyond the Basics: A Software
                                  Publication Series for Successful
                                  Computer Professionals From the IEEE
                                  Computer Society . . . . . . . . . . . . 506--d-506--d
                      Anonymous   IEEE Computer Society Publications . . . 506--c-506--c
                      Anonymous   Membership Application . . . . . . . . . 506--b-506--b
                      Anonymous   IEEE Computer Society  . . . . . . . . . c2--c2
                      Anonymous   \booktitleIEEE Transactions on Software
                                  Engineering --- Table of contents  . . . c1--c1

IEEE Transactions on Software Engineering
Volume SE-13, Number 5, May, 1987

                      T. Chusho   Test Data Selection and Quality
                                  Estimation Based on the Concept of
                                  Essential Branches for Path Testing  . . 509--517
                B. Sarikaya and   
             G. v. Bochmann and   
                       E. Cerny   A Test Design Methodology for Protocol
                                  Testing  . . . . . . . . . . . . . . . . 518--531
               Y. H. Kamath and   
                 M. M. Matthews   Implementation of an FP-Shell  . . . . . 532--539
                    S. Katz and   
                     O. Shmueli   Cooperative Distributed Algorithms for
                                  Dynamic Cycle Prevention . . . . . . . . 540--552
               J. C. Knight and   
              J. I. A. Urquhart   On the Implementation and Use of Ada on
                                  Fault-Tolerant Distributed Systems . . . 553--563
                   Wei Zhao and   
             K. Ramamritham and   
                J. A. Stankovic   Scheduling Tasks with Resource
                                  Requirements in Hard Real-Time Systems   564--577
                      J. Magott   New NP-Complete Problems in Performance
                                  Evaluation of Concurrent Systems Using
                                  Petri Nets . . . . . . . . . . . . . . . 578--581
                R. K. Scott and   
                J. W. Gault and   
               D. F. McAllister   Fault-Tolerant Software Reliability
                                  Modeling . . . . . . . . . . . . . . . . 582--592
                   R. N. Mathur   Methodology for Business System
                                  Development  . . . . . . . . . . . . . . 593--601
                S. Masuyama and   
                 T. Ibaraki and   
                  S. Nishio and   
                    T. Hasegawa   Shortest Semijoin Schedule for a Local
                                  Area Distributed Database System . . . . 602--606
                      Anonymous   In this issue  . . . . . . . . . . . . . 607--607
                      Anonymous   Beyond the Basics: A Software
                                  Publication Series for Successful
                                  Computer Professionals From the IEEE
                                  Computer Society . . . . . . . . . . . . 607--c-607--c
                      Anonymous   IEEE Computer Society Publications . . . 607--b-607--b
                      Anonymous   The Information Edge . . . . . . . . . . 607--a-607--a
                      Anonymous   IEEE Computer Society  . . . . . . . . . c2--c2
                      Anonymous   \booktitleIEEE Transactions on Software
                                  Engineering --- Table of contents  . . . c1--c1

IEEE Transactions on Software Engineering
Volume SE-13, Number 6, June, 1987

                    S. P. Reiss   Automatic Compiler Production: The Front
                                  End  . . . . . . . . . . . . . . . . . . 609--627
              K. Felgentreu and   
                W. M. Lippe and   
                    F. H. Simon   Optimizing Static Scope Lisp by
                                  Repetitive Interpretation of Recursive
                                  Function Calls . . . . . . . . . . . . . 628--635
               F. W. Burton and   
                  D. Maurer and   
           H. G. Oberhauser and   
                     R. Wilhelm   A Space-Efficient Optimization of
                                  Call-by-Need . . . . . . . . . . . . . . 636--642
                  S. K. Das and   
              V. K. Agrawal and   
                  D. Sarkar and   
              L. M. Patnaik and   
                     P. S. Goel   Reflexive Incidence Matrx (RIM)
                                  Representation of Petri Nets . . . . . . 643--653
             R. L. Bagrodia and   
               K. M. Chandy and   
                       J. Misra   A Message-Based Approach to
                                  Discrete-Event Simulation  . . . . . . . 654--665
              R. D. Schultz and   
                 A. F. Cardenas   An Approach and Mechanism for Auditable
                                  and Testable Advanced Transaction
                                  Processing Systems . . . . . . . . . . . 666--676
                  R. P. Roe and   
                  J. H. Rowland   Some Theory Concerning Certification of
                                  Mathematical Subroutines by Black Box
                                  Testing  . . . . . . . . . . . . . . . . 677--682
                 G. J. Holzmann   Automated Protocol Validation in Argos:
                                  Assertion Proving and Scatter Searching  683--696
                   H. F. Li and   
                   W. K. Cheung   An Empirical Study of Software Metrics   697--708
                  S. B. Yao and   
               A. R. Hevner and   
                 H. Young-Myers   Analysis of Database System
                                  Architectures Using Benchmarks . . . . . 709--725
               Chuan-Qi Zhu and   
                  Pen-Chung Yew   A Scheme to Enforce Data Dependence on
                                  Large Multiprocessor Systems . . . . . . 726--739
           S. Purushothaman and   
             P. A. Subrahmanyam   Reasoning About Probabilistic Behavior
                                  in Concurrent Systems  . . . . . . . . . 740--745
                    M. J. Carey   Improving the Performance of an
                                  Optimistic Concurrency Control Algorithm
                                  Through Timestamps and Versions  . . . . 746--751
                   M. Chellappa   Nontraversible Paths in a Program  . . . 751--756
                J. Y. Le Boudec   Interinput and Interoutput Time
                                  Distribution in Classical Product-Form
                                  Networks . . . . . . . . . . . . . . . . 756--759
               K. V. S. Ramarao   Comments on ``Detection of Mutual
                                  Inconsistency in Distributed Systems''   759--760
                      Anonymous   Information for authors  . . . . . . . . 760--760
                      Anonymous   IEEE Computer Society Publications . . . 760--a-760--a
                      Anonymous   IEEE Computer Society  . . . . . . . . . c2--c2
                      Anonymous   \booktitleIEEE Transactions on Software
                                  Engineering --- Table of contents  . . . c1--c1

IEEE Transactions on Software Engineering
Volume SE-13, Number 7, July, 1987

              R. E. Prather and   
                    J. P. Myers   The Path Prefix Software Testing
                                  Strategy . . . . . . . . . . . . . . . . 761--766
                 N. M. Bengtson   Measuring Errors in Operational Analysis
                                  Assumptions  . . . . . . . . . . . . . . 767--776
          J. C. Cherniavsky and   
                    C. H. Smith   A Recursion Theoretic Approach to
                                  Program Testing  . . . . . . . . . . . . 777--784
                       A. Motro   Superviews: Virtual Integration of
                                  Multiple Databases . . . . . . . . . . . 785--798
                W. De Jonge and   
            A. S. Tanenbaum and   
              R. P. Van De Riet   Two Access Methods Using Compact Binary
                                  Trees  . . . . . . . . . . . . . . . . . 799--810
                 S. Jajodia and   
              F. N. Springsteel   Construction of Universal Instances for
                                  Loop-Free Network Databases Using a
                                  Join-Like Operation  . . . . . . . . . . 811--819
               J. D. Gannon and   
               R. G. Hamlet and   
                    H. D. Mills   Theory of Modules  . . . . . . . . . . . 820--829
                     P. Freeman   A Conceptual Analysis of the Draco
                                  Approach to Constructing Software
                                  Systems  . . . . . . . . . . . . . . . . 830--844
                 D. N. Card and   
             F. E. Mc Garry and   
                     G. T. Page   Evaluating Software Engineering
                                  Technologies . . . . . . . . . . . . . . 845--851
                  D. R. Jeffery   Time-Sensitive Cost Models in the
                                  Commercial MIS Environment . . . . . . . 852--859
                 S. M. Deen and   
                 R. R. Amin and   
                   M. C. Taylor   Data Integration in Distributed
                                  Databases  . . . . . . . . . . . . . . . 860--864
                 C. M. Davidson   A Note on Concurrent Programming Control 865--866
                      Anonymous   In this issue  . . . . . . . . . . . . . 867--867
                      Anonymous   The One Leveraged Investment With a
                                  Guaranteed Return  . . . . . . . . . . . 867--867--a
                      Anonymous   IEEE Computer Society Publications . . . 867--b-867--b
                      Anonymous   IEEE Computer Society  . . . . . . . . . c2--c2
                      Anonymous   \booktitleIEEE Transactions on Software
                                  Engineering --- Table of contents  . . . c1--c1

IEEE Transactions on Software Engineering
Volume SE-13, Number 8, August, 1987

                 S. Jajodia and   
                 S. K. Tripathy   Foreword . . . . . . . . . . . . . . . . 869--870
                      Anonymous   List of referees . . . . . . . . . . . . 871--871
             S. K. Tripathi and   
               Yennun Huang and   
                     S. Jajodia   Local Area Networks: Software and
                                  Related Issues . . . . . . . . . . . . . 872--879
              B. N. Bershad and   
                D. T. Ching and   
             E. D. Lazowska and   
                 J. Sanislo and   
                    M. Schwartz   A Remote Procedure Call Facility for
                                  Interconnecting Heterogeneous Computer
                                  Systems  . . . . . . . . . . . . . . . . 880--894
                  R. C. Summers   A Resource Sharing System for Personal
                                  Computers in a LAN: Concepts, Design,
                                  and Experience . . . . . . . . . . . . . 895--904
                 R. Agrawal and   
                    A. K. Ezzat   Location Independent Remote Execution in
                                  NEST . . . . . . . . . . . . . . . . . . 905--912
                  J. Nehmer and   
                   D. Haban and   
                 F. Mattern and   
              D. Wybranietz and   
                  H. D. Rombach   Key Concepts of the INCAS Multicomputer
                                  Project  . . . . . . . . . . . . . . . . 913--923
                    P. Jain and   
                      S. S. Lam   Modeling and Verification of Real-Time
                                  Protocols for Broadcast Networks . . . . 924--937
                   Wei Zhao and   
                 K. Ramamritham   Virtual Time CSMA Protocols for Hard
                                  Real-Time Communication  . . . . . . . . 938--952
              D. J. De Witt and   
                  R. Finkel and   
                     M. Solomon   The Crystal Multicomputer: Design and
                                  Implementation Experience  . . . . . . . 953--966
                  S. Ramesh and   
              S. L. Mehndiratta   A Methodology for Developing Distributed
                                  Programs . . . . . . . . . . . . . . . . 967--976
                Je-Hao Wang and   
               Tak-Sun Yuen and   
                    D. H. C. Du   On Multiple Random Accesses and Physical
                                  Data Placement in Dynamic Files  . . . . 977--987
                      Anonymous   In this issue  . . . . . . . . . . . . . 987--987
                      Anonymous   Beyond The Basics: A Software
                                  Publication Series for Successful
                                  Computer Professionals From the IEEE
                                  Computer Society . . . . . . . . . . . . 987--a-987--a
                      Anonymous   IEEE Computer Society Publications . . . 987--b-987--b
                      Anonymous   IEEE Computer Society  . . . . . . . . . c2--c2
                      Anonymous   \booktitleIEEE Transactions on Software
                                  Engineering --- Table of contents  . . . c1--c1

IEEE Transactions on Software Engineering
Volume SE-13, Number 9, September, 1987

             G. v. Bochmann and   
               G. W. Gerber and   
                    J. M. Serre   Semiautomatic Implementation of
                                  Communication Protocols  . . . . . . . . 989--1000
                G. T. Almes and   
                   C. L. Holman   Edmas: An Object-Oriented, Locally
                                  Distributed Mail System  . . . . . . . . 1001--1009
               V. Gurbaxani and   
                   H. Mendelson   Software and Hardware in Data Processing
                                  Budgets  . . . . . . . . . . . . . . . . 1010--1017
                     Y. Y. Sung   Performance Analysis of Disk Modulo
                                  Allocation Method for Cartesian Product
                                  Files  . . . . . . . . . . . . . . . . . 1018--1026
                R. W. Selby and   
               V. R. Basili and   
                    F. T. Baker   Cleanroom Software Development: An
                                  Empirical Evaluation . . . . . . . . . . 1027--1037
                     Y. Shi and   
                  N. Prywes and   
               B. Szymanski and   
                      A. Pnueli   Very High Level Concurrent Programming   1038--1046
                     S. Jajodia   An Extension of ``Representative
                                  Instances and $ \gamma $-Acyclic
                                  Relational Schemes'' . . . . . . . . . . 1047--1048
                      Anonymous   The Computer Society . . . . . . . . . . 1048--b-1048--b
                      Anonymous   IEEE Computer Society Publications . . . 1048--a-1048--a
                      Anonymous   IEEE Computer Society  . . . . . . . . . c2--c2
                      Anonymous   \booktitleIEEE Transactions on Software
                                  Engineering --- Table of contents  . . . c1--c1

IEEE Transactions on Software Engineering
Volume SE-13, Number 10, October, 1987

                      T. T. Lee   An Information-Theoretic Analysis of
                                  Relational Databases --- Part I: Data
                                  Dependencies and Information Metric  . . 1049--1061
                      T. T. Lee   An Information-Theoretic Analysis of
                                  Relational Databases --- Part II:
                                  Information Structures of Database
                                  Schemas  . . . . . . . . . . . . . . . . 1062--1072
               A. A. Farrag and   
                     M. T. Ozsu   Towards a General Concurrency Control
                                  Algorithm for Database Systems . . . . . 1073--1079
               E. T. Morgan and   
                   R. R. Razouk   Interactive State-Space Analysis of
                                  Concurrent Systems . . . . . . . . . . . 1080--1091
                     H. K. Jain   A Comprehensive Model for the Design of
                                  Distributed Computer Systems . . . . . . 1092--1104
               R. A. Sahner and   
                  K. S. Trivedi   Performance and Reliability Analysis
                                  Using Directed Acyclic Graphs  . . . . . 1105--1114
                     K. Rea and   
              R. De B. Johnston   Automated Analysis of Discrete
                                  Communication Behavior . . . . . . . . . 1115--1126
                 K. M. Kavi and   
              B. P. Buckles and   
                     U. N. Bhat   Isomorphisms Between Petri Nets and
                                  Dataflow Graphs  . . . . . . . . . . . . 1127--1134
                  S. Mourad and   
                     D. Andrews   On the Reliability of the IBM MVS/XA
                                  Operating System . . . . . . . . . . . . 1135--1139
                      Anonymous   Beyond The Basics: A Software
                                  Publication Series for Successful
                                  Computer Professionals From the IEEE
                                  Computer Society . . . . . . . . . . . . 1139--a-1139--a
                      Anonymous   The Computer Society . . . . . . . . . . 1139--c-1139--c
                      Anonymous   IEEE Computer Society Publications . . . 1139--b-1139--b
                      Anonymous   IEEE Computer Society  . . . . . . . . . c2--c2
                      Anonymous   \booktitleIEEE Transactions on Software
                                  Engineering --- Table of contents  . . . c1--c1

IEEE Transactions on Software Engineering
Volume SE-13, Number 11, November, 1987

                  R. E. Fairley   Guest Editor's Introduction  . . . . . . 1141--1142
                     P. Freeman   Essential Elements of Software
                                  Engineering Education Revisited  . . . . 1143--1148
                    M. A. Ardis   The Evolution of Wang Institute's Master
                                  of Software Engineering Program  . . . . 1149--1155
                    D. M. Weiss   Teaching a Software Design Methodology   1156--1163
              J. L. Bentley and   
                   J. A. Dallen   Exercises in Software Design . . . . . . 1164--1169
                J. E. Burns and   
                E. L. Robertson   Two Complementary Course Sequences on
                                  the Design and Implementation of
                                  Software Products  . . . . . . . . . . . 1170--1175
                  D. B. Wortman   Software Projects in an Academic
                                  Environment  . . . . . . . . . . . . . . 1176--1181
                W. M. Mc Keeman   Experience with a Software Engineering
                                  Project Course . . . . . . . . . . . . . 1182--1192
            L. M. Leventhal and   
                   B. T. Mynatt   Components of Typical Undergraduate
                                  Software Engineering Courses: Results
                                  from a Survey  . . . . . . . . . . . . . 1193--1198
               W. E. Riddle and   
                 L. G. Williams   Technology Selection: An Educational
                                  Approach . . . . . . . . . . . . . . . . 1199--1206
                 J. Z. Lavi and   
             M. I. B. Porat and   
                   A. Ben-David   IAI Corporate Software Engineering
                                  Training and Education Program . . . . . 1207--1216
                      Anonymous   The Computer Society . . . . . . . . . . 1216--b-1216--b
                      Anonymous   IEEE Computer Society Publications . . . 1216--a-1216--a
                      Anonymous   IEEE Computer Society  . . . . . . . . . c2--c2
                      Anonymous   \booktitleIEEE Transactions on Software
                                  Engineering --- Table of contents  . . . c1--c1

IEEE Transactions on Software Engineering
Volume SE-13, Number 12, December, 1987

                      Anonymous   Editorial  . . . . . . . . . . . . . . . 1217--1217
                S. Aggarwal and   
                 D. Barbara and   
                     K. Z. Meth   Spanner: A Tool for the Specification,
                                  Analysis, and Evaluation of Protocols    1218--1237
               Pei-Jyun Leu and   
                    B. Bhargava   Multidimensional Timestamp Protocols for
                                  Concurrency Control  . . . . . . . . . . 1238--1253
                   R. Hayes and   
              R. D. Schlichting   Facilitating Mixed Language Programming
                                  in Distributed Systems . . . . . . . . . 1254--1264
                 V. Milutinovic   A Simulation Study of the
                                  Vertical-Migration Microprocessor
                                  Architecture . . . . . . . . . . . . . . 1265--1277
               V. R. Basili and   
                    R. W. Selby   Comparing the Effectiveness of Software
                                  Testing Strategies . . . . . . . . . . . 1278--1296
             M. A. Holliday and   
                   M. K. Vernon   A Generalized Timed Petri Net Model for
                                  Performance Analysis . . . . . . . . . . 1297--1310
                  K. H. Pun and   
                  G. G. Belford   Performance Study of Two Phase Locking
                                  in Single-Site Database Systems  . . . . 1311--1328
                 Y. H. Chin and   
                 Weng-Ling Peng   An Evaluation of Two New Inference
                                  Control Methods  . . . . . . . . . . . . 1329--1339
                  S. Biswas and   
                   V. Rajaraman   An Algorithm to Decide Feasibility of
                                  Linear Integer Constraints Occurring in
                                  Decision Tables  . . . . . . . . . . . . 1340--1347
                 R. Agrawal and   
                M. J. Carey and   
                    L. W. Mcvoy   The Performance of Alternative
                                  Strategies for Dealing with Deadlocks in
                                  Database Management Systems  . . . . . . 1348--1363
                      N. Y. Foo   Algebraic Specifications as Solutions of
                                  Implementation Equations . . . . . . . . 1364--1369
             H. K. N. Leung and   
                 H. K. Reghbati   Comments on Program Slicing  . . . . . . 1370--1371
                      Anonymous   In this issue  . . . . . . . . . . . . . 1371--1371
                      Anonymous   1987 Index \booktitleIEEE Transactions
                                  on Software Engineering Vol. SE-13 . . . 1371--1371
                      Anonymous   The Computer Society . . . . . . . . . . 1371--k-1371--k
                      Anonymous   IEEE Computer Society Publications . . . 1371--j-1371--j
                      Anonymous   IEEE Computer Society  . . . . . . . . . c2--c2
                      Anonymous   \booktitleIEEE Transactions on Software
                                  Engineering --- Table of contents  . . . c1--c1


IEEE Transactions on Software Engineering
Volume 14, Number 1, January, 1988

                   C. R. Symons   Function point analysis: difficulties
                                  and improvements . . . . . . . . . . . . 2--11
                   R. G. Dromey   Systematic program development . . . . . 12--29
                F. Panzieri and   
              S. K. Shrivastava   Rajdoot: a remote procedure call
                                  mechanism supporting orphan detection
                                  and killing  . . . . . . . . . . . . . . 30--37
              L. F. Cabrera and   
                  E. Hunter and   
               M. J. Karels and   
                   D. A. Hosher   User-process communication performance
                                  in networks of computers . . . . . . . . 38--53
          V. M. Milutinovic and   
             J. J. Crnkovic and   
                  C. E. Houstis   A simulation study of two distributed
                                  task allocation procedures . . . . . . . 54--61
                 I. F. Akyildiz   On the exact and approximate throughput
                                  analysis of closed queuing networks with
                                  blocking . . . . . . . . . . . . . . . . 62--70
             M. A. Ketabchi and   
                     V. Berzins   Mathemtical model of composite objects
                                  and its application for organizing
                                  engineering databases  . . . . . . . . . 71--84
                 N. H. Madhavji   Fragtypes: a basis for programming
                                  environments . . . . . . . . . . . . . . 85--97
                D. P. Sidhu and   
                    C. S. Crall   Executable logic specifications for
                                  protocol service interfaces  . . . . . . 98--112
                  P. J. Leu and   
                    B. Bhargava   Clarification of two phase locking in
                                  concurrent transaction processing  . . . 122--125
                     J. Bradley   A group-select operation for relational
                                  algebra and implications for database
                                  machine design . . . . . . . . . . . . . 126--129

IEEE Transactions on Software Engineering
Volume 14, Number 2, February, 1988

                     M. H. Eich   Graph directed locking . . . . . . . . . 133--140
             T. L. Casavant and   
                     J. G. Kuhl   A taxonomy of scheduling in
                                  general-purpose distributed computing
                                  systems  . . . . . . . . . . . . . . . . 141--154
                    J. Kent and   
               H. Garcia-Molina   Optimizing shadow recovery algorithms    155--168
                       M. Adler   An algebra for data flow diagram process
                                  decomposition  . . . . . . . . . . . . . 169--183
                  T. T. Lee and   
                      M. Y. Lai   A relational algebraic approach to
                                  protocol verification  . . . . . . . . . 184--193
                  J. Karimi and   
                B. R. Konsynski   An automated software design assistant   194--210
                    V. Dhar and   
                       M. Jarke   Dependence directed reasoning and
                                  learning in systems maintenance support  211--227
           A. I. Concepcion and   
                  B. P. Zeigler   DEVS formalism: a framework for
                                  hierarchical model development . . . . . 228--241
               J. Choobineh and   
              M. V. Mannino and   
            J. F. Nunamaker and   
                B. R. Konsynski   An expert database design system based
                                  on analysis of forms . . . . . . . . . . 242--253
                    C. T. Baker   Effects of field service on software
                                  reliability  . . . . . . . . . . . . . . 254--258
            R. C. B. Cooper and   
                 K. G. Hamilton   Preserving abstraction in concurrent
                                  programming  . . . . . . . . . . . . . . 258--263
                        D. Gray   The formal specification of a small
                                  bookshop information system  . . . . . . 263--272
                V. Ambriola and   
                      D. Notkin   Reasoning about interactive system . . . 272--276

IEEE Transactions on Software Engineering
Volume 14, Number 3, March, 1988

                S. Aggarwal and   
                 D. Barbara and   
                     K. Z. Meth   A software environment for the
                                  specification and analysis of problems
                                  of coordination and concurrency  . . . . 280--290
                 D. P. Anderson   Automated protocol implementation with
                                  RTAG . . . . . . . . . . . . . . . . . . 291--300
              J. Billington and   
              G. R. Wheeler and   
               M. C. Wilbur-Ham   PROTEAN: a high-level Petri net tool for
                                  the specification and verification of
                                  communication protocols  . . . . . . . . 301--316
              E. J. Cameron and   
                D. M. Cohen and   
                B. Gopinath and   
                W. M. Keese and   
                    L. Ness and   
                P. Uppaluru and   
                  J. R. Vollaro   The IC* model of parallel computation
                                  and programming environment  . . . . . . 317--326
                 C. H. Chow and   
                      S. S. Lam   PROSPEC: an interactive programming
                                  environment for designing and verifying
                                  communication protocols  . . . . . . . . 327--338
                    C. Jard and   
                J. F. Monin and   
                        R. Groz   Development of Veda, a prototyping tool
                                  for distributed algorithms . . . . . . . 339--352
                      S. S. Lam   Protocol conversion  . . . . . . . . . . 353--362
             R. S. Matthews and   
           K. H. Muralidhar and   
                      S. Sparks   MAP 2.1 conformance testing tools  . . . 363--374
                  S. Sevinc and   
                  B. P. Zeigler   Entity structure based design
                                  methodology: a LAN protocol example  . . 375--383
                S. T. Vuong and   
                  A. C. Lau and   
                     R. I. Chan   Semiautomatic implementation of
                                  protocols using an Estelle-C compiler    384--393
                Y. X. Zhang and   
               K. Takahashi and   
               N. Shiratori and   
                     S. Noguchi   An interactive protocol synthesis
                                  algorithm using a global state
                                  transition graph . . . . . . . . . . . . 394--404

IEEE Transactions on Software Engineering
Volume 14, Number 4, April, 1988

                  S. S. Yau and   
                        W. Hong   Verification of concurrent control flow
                                  in distributed computer systems  . . . . 405--417
                 I. F. Akyildiz   Mean value analysis for blocking
                                  queueing networks  . . . . . . . . . . . 418--428
             K. R. Dittrich and   
                    R. A. Lorie   Version support for engineering database
                                  systems  . . . . . . . . . . . . . . . . 429--437
                   H. Alexander   Comments on ``Formal specification of
                                  user interfaces: a comparison and
                                  evaluation of four axiomatic
                                  approaches'' by U. H. Chi  . . . . . . . 438--439
                 W. Cellary and   
             Z. Krolikowski and   
                       T. Morzy   Other comments on ``Optimization
                                  algorithms for distributed queries'' by
                                  P. M. G. Apers . . . . . . . . . . . . . 439--441
                B. G. Ryder and   
              J. S. Pendergrast   Experiments in optimizing FP . . . . . . 444--454
                  K. Schwan and   
                 R. Ramnath and   
               S. Vasudevan and   
                        D. Ogle   A language and system for the
                                  construction and tuning of parallel
                                  programs . . . . . . . . . . . . . . . . 455--471
                   B. Jayaraman   Semantics of EqL . . . . . . . . . . . . 472--480
                  T. Murata and   
                       D. Zhang   A predicate-transition net model for
                                  parallel interpretation of logic
                                  programs . . . . . . . . . . . . . . . . 481--497
                         T. Rus   Parsing languages by pattern matching    498--511
                 A. L. Wolf and   
               L. A. Clarke and   
                  J. C. Wileden   A model of visibility control  . . . . . 512--520
                      Anonymous   Foreword . . . . . . . . . . . . . . . . 521--521
            P. Heidelberger and   
                  M. S. Lakshmi   A performance comparison of multimicro
                                  and mainframe database architectures . . 522--531
                  R. Nelson and   
                 D. Towsley and   
                  A. N. Tantawi   Performance analysis of parallel
                                  processing systems . . . . . . . . . . . 532--540
                 D. A. Reed and   
               A. D. Malony and   
                 B. D. McCredie   Parallel discrete event simulation using
                                  shared memory  . . . . . . . . . . . . . 541--553

IEEE Transactions on Software Engineering
Volume 14, Number 5, May, 1988

                        W. Damm   A microprogramming logic . . . . . . . . 559--574
              R. A. Mueller and   
                 M. R. Duda and   
               P. H. Sweany and   
                  J. S. Walicki   Horizon: a retargetable compiler for
                                  horizontal microarchitectures  . . . . . 575--583
                   A. Aiken and   
                     A. Nicolau   A development environment for horizontal
                                  microcode  . . . . . . . . . . . . . . . 584--594
                V. H. Allan and   
                  R. A. Mueller   Compaction with general synchronous
                                  timing . . . . . . . . . . . . . . . . . 595--599
                   R. I. Winner   Naming and binding in a vertical
                                  migration environment  . . . . . . . . . 599--607
            J. A. Orenstein and   
                   F. A. Manola   PROBE spatial data modeling and query
                                  processing in an image database
                                  application  . . . . . . . . . . . . . . 611--629
                  T. Joseph and   
                 A. F. Cardenas   PICQUERY: a high level query language
                                  for pictorial database management  . . . 630--638
            N. Roussopoulos and   
               C. Faloutsos and   
                      T. Sellis   An efficient pictorial database system
                                  for PSQL . . . . . . . . . . . . . . . . 639--650
                   Y. Cheng and   
             S. S. Iyengara and   
                  R. L. Kashyap   A new method of image compression using
                                  irreducible covers of maximal rectangles 651--658
            A. Unnikrishnan and   
                 P. Shankar and   
                Y. V. Venkatesh   Threaded linear hierarchical quadtrees
                                  for computation of geometric properties
                                  of binary images . . . . . . . . . . . . 659--665
                  M. Tanaka and   
                    T. Ichikawa   A visual user interface for map
                                  information retrieval based on semantic
                                  significance . . . . . . . . . . . . . . 666--670
                 R. Kasturi and   
                     J. Alemany   Information extraction from images of
                                  paper-based maps . . . . . . . . . . . . 671--675
                   L. Mohan and   
                  R. L. Kashyap   An object-oriented knowledge
                                  representation for spatial information   675--681
                S. K. Chang and   
                  C. W. Yan and   
            D. C. Dimitroff and   
                       T. Arndt   An intelligent image database system . . 681--688

IEEE Transactions on Software Engineering
Volume 14, Number 6, June, 1988

                   M. Young and   
               R. N. Taylor and   
                    D. B. Troup   Software environment architectures and
                                  user interface facilities  . . . . . . . 697--708
               S. E. Hudson and   
                        R. King   The Cactis project: database support for
                                  software environments  . . . . . . . . . 709--719
          A. Van Lamsweerde and   
                B. Delcourt and   
                   E. Delor and   
              M. C. Schayes and   
                   R. Champagne   Generic lifecycle support in the ALMA
                                  environment  . . . . . . . . . . . . . . 720--741
                P. A. Oberndorf   The Common Ada Programming Support
                                  Environment (APSE) Interface Set (CAIS)  742--748
               J. Ramanthan and   
                      S. Sarkar   Providing customized assistance for
                                  software lifecycle approaches  . . . . . 749--757
               V. R. Basili and   
                  H. D. Rombach   The TAME project: towards
                                  improvement-oriented software
                                  environments . . . . . . . . . . . . . . 758--773
                      G. Fisher   An overview of a graphical multilanguage
                                  applications environment . . . . . . . . 774--786
               A. Giacalone and   
                   S. A. Smolka   Integrated environments for formally
                                  well-founded design and simulation of
                                  concurrent systems . . . . . . . . . . . 787--802
              R. M. Herndon and   
                  V. A. Berzins   The realizable benefits of a language
                                  prototyping language . . . . . . . . . . 803--809
                      K. H. Kim   Programmer-transparent coordination of
                                  recovering concurrent processes:
                                  philosophy and rules for efficient
                                  implementation . . . . . . . . . . . . . 810--821
                   B. Meandzija   Archetype: a unified method for the
                                  design and implementation of protocol
                                  architectures  . . . . . . . . . . . . . 822--837
     Krishna P. Mikkilineni and   
               Stanley Y. W. Su   An Evaluation of Relational Join
                                  Algorithms in a Pipelined Query
                                  Processing Environment . . . . . . . . . 838--848
                    T. G. Moher   PROVIDE: a process visualization and
                                  debugging environment  . . . . . . . . . 849--857
                  A. Moitra and   
              S. S. Iyengar and   
              F. B. Bastani and   
                      I. L. Yen   Multilevel data structures: models and
                                  performance  . . . . . . . . . . . . . . 858--867
                   S. C. Ntafos   A comparison of some structural testing
                                  strategies . . . . . . . . . . . . . . . 868--874

IEEE Transactions on Software Engineering
Volume 14, Number 7, July, 1988

                     R. Agrawal   Alpha: an extension of relational
                                  algebra to express a class of recursive
                                  queries  . . . . . . . . . . . . . . . . 879--885
           H. Garcia-Molina and   
                       B. Kogan   Achieving high availability in
                                  distributed databases  . . . . . . . . . 886--896
             M. Stonebraker and   
               E. N. Hanson and   
                  S. Potamianos   The POSTGRES rule manager  . . . . . . . 897--907
                 B. C. Jenq and   
               W. H. Kohler and   
                     D. Towsley   A queueing network model for a
                                  distributed database testbed system  . . 908--921
                   M. Kifer and   
                E. L. Lozinskii   SYGRAF: implementing logic programs in a
                                  database style . . . . . . . . . . . . . 922--935
                      C. Pu and   
                  J. D. Noe and   
                   A. Proudfoot   Regeneration of replicated objects: a
                                  technique and its Eden implementation    936--945
            S. A. Demurjian and   
                    D. K. Hsiao   Towards a better understanding of data
                                  models through the multilingual database
                                  system . . . . . . . . . . . . . . . . . 946--958
                     M. Kao and   
                 N. Cercone and   
                      W. S. Luk   Providing quality responses with natural
                                  language interfaces: the null value
                                  problem  . . . . . . . . . . . . . . . . 959--984
                     W. Kim and   
                 H. T. Chou and   
                    J. Banerjee   Operations and implementation of complex
                                  objects  . . . . . . . . . . . . . . . . 985--996
                 T. Ibaraki and   
                  T. Kameda and   
                       N. Katoh   Cautious transaction schedulers for
                                  database concurrency control . . . . . . 997--1009
                     H. Lam and   
                S. Y. W. Su and   
                  N. R. Koganti   A physical database design evaluation
                                  system for CODASYL databases . . . . . . 1010--1022
               J. Stelovsky and   
                      H. Sugaya   A system for specification and rapid
                                  prototyping of application command
                                  languages  . . . . . . . . . . . . . . . 1023--1032
                     N. C. Rowe   Absolute bounds on set intersection and
                                  union sizes from distribution
                                  information  . . . . . . . . . . . . . . 1033--1048
                    K. Siegrist   Reliability of systems with Markov
                                  transfer of control  . . . . . . . . . . 1049--1053

IEEE Transactions on Software Engineering
Volume 14, Number 8, August, 1988

                  Y. Kakuda and   
                Y. Wakahara and   
                     M. Norigoe   An acyclic expansion algorithm for fast
                                  protocol validation  . . . . . . . . . . 1059--1070
                M. A. Bassiouni   Single-site and distributed optimistic
                                  protocols for concurrency control  . . . 1071--1080
              K. C. Kinsley and   
                   C. E. Hughes   Evaluating database update schemes: a
                                  methodology and its applications to
                                  distributive systems . . . . . . . . . . 1081--1089
                        Y. Wang   A distributed specification model and
                                  its prototyping  . . . . . . . . . . . . 1090--1097
                   T. Tenma and   
               H. Tsubotani and   
                  M. Tanaka and   
                    T. Ichikawa   A system for generating
                                  language-oriented editors  . . . . . . . 1098--1109
                        M. Edel   The Tinkertoy graphical programming
                                  environment  . . . . . . . . . . . . . . 1110--1115
              B. Ramamurthy and   
                      A. Melton   A synthesis of software science measures
                                  and the cyclomatic number  . . . . . . . 1116--1121
                    S. M. Shatz   Towards complexity metrics for Ada
                                  tasking  . . . . . . . . . . . . . . . . 1122--1127
                  S. S. Yau and   
              R. A. Nicholl and   
              J. J. P. Tsai and   
                      S. S. Liu   An integrated life-cycle model for
                                  software maintenance . . . . . . . . . . 1128--1144
          C. V. Ramamoorthy and   
                    V. Garg and   
                     A. Prakash   Support for reusability in Genesis . . . 1145--1154
                   C. F. Yu and   
                      B. W. Wah   Learning dominance relations in combined
                                  search problems  . . . . . . . . . . . . 1155--1175
                  S. J. Hartley   An analysis of some problems in managing
                                  virtual memory systems with fast
                                  secondary storage devices  . . . . . . . 1176--1187
               S. E. Hudson and   
                        R. King   Semantic feedback in the Higgens UIMS    1188--1206
                   R. C. Waters   Program translation via abstraction and
                                  reimplementation . . . . . . . . . . . . 1207--1228
                G. Von Bochmann   Delay-independent design for distributed
                                  systems  . . . . . . . . . . . . . . . . 1229--1237
           Michael L. Scott and   
              Raphael A. Finkel   A simple mechanism for type security
                                  across compilation units . . . . . . . . 1238--1239

IEEE Transactions on Software Engineering
Volume 14, Number 9, September, 1988

                 D. Hoffman and   
                   R. Snodgrass   Trace specifications: methodology and
                                  models . . . . . . . . . . . . . . . . . 1243--1252
                       B. Korel   PELAS-program error-locating assistant
                                  system . . . . . . . . . . . . . . . . . 1253--1260
                   T. J. Yu and   
                 V. Y. Shen and   
                 H. E. Dunsmore   An analysis of several software defect
                                  models . . . . . . . . . . . . . . . . . 1261--1270
                       T. Tenny   Program readability: procedures versus
                                  comments . . . . . . . . . . . . . . . . 1271--1279
                       L. Orman   Functional development of database
                                  applications . . . . . . . . . . . . . . 1280--1292
                   P. Rullo and   
                       D. Sacca   An automatic physical designer for
                                  network model databases  . . . . . . . . 1293--1306
                   P. S. Yu and   
                 S. Balsamo and   
                      Y. H. Lee   Dynamic transaction routing in
                                  distributed database systems . . . . . . 1307--1318
                S. Pramanik and   
                    D. Vineyard   Optimizing join queries in distributed
                                  databases  . . . . . . . . . . . . . . . 1319--1326
                        S. Zhou   A trace-driven simulation study of
                                  dynamic load balancing . . . . . . . . . 1327--1341
                   C. F. Yu and   
                      B. W. Wah   Efficient branch-and-bound algorithms on
                                  a two-level memory system  . . . . . . . 1342--1356
                  E. J. Weyuker   Evaluating software complexity measures  1357--1365
                J. S. Davis and   
                  R. J. LeBlanc   A study of the applicability of
                                  complexity measures  . . . . . . . . . . 1366--1372
                J. T. Nosek and   
                 R. B. Schwartz   User validation of information system
                                  requirements: some empirical results . . 1372--1375
                      S. S. Lam   Correction to `Protocol conversion'  . . 1376

IEEE Transactions on Software Engineering
Volume 14, Number 10, October, 1988

             Christos Faloutsos   Gray codes for partial match and range
                                  queries  . . . . . . . . . . . . . . . . 1381--1393
                    C. U. Smith   Applying synthesis principles to create
                                  responsive software systems  . . . . . . 1394--1408
                       Luqi and   
                 V. Berzins and   
                         R. Yeh   A prototyping language for real-time
                                  software . . . . . . . . . . . . . . . . 1409--1423
               J. L. W. Kessels   PHILAN: a LAN providing a reliable
                                  message service for distributed
                                  processing . . . . . . . . . . . . . . . 1424--1431
              F. B. Bastani and   
                  I. L. Yen and   
                     I. R. Chen   A class of inherently fault tolerant
                                  distributed programs . . . . . . . . . . 1432--1442
           A. K. Elmagarmid and   
           N. Soundararajan and   
                      M. T. Liu   A distributed deadlock detection and
                                  resolution algorithm and its correctness
                                  proof  . . . . . . . . . . . . . . . . . 1443--1452
                A. M. Davis and   
              E. H. Bersoff and   
                    E. R. Comer   A strategy for comparing alternative
                                  software development life cycle models   1453--1461
                B. W. Boehm and   
                 P. N. Papaccio   Understanding and controlling software
                                  costs  . . . . . . . . . . . . . . . . . 1462--1477
                    K. Siegrist   Reliability of systems with Markov
                                  transfer of control, II  . . . . . . . . 1478--1480
                 C. M. Davidson   Quicksort revisited  . . . . . . . . . . 1480--1481
               P. G. Frankl and   
                  E. J. Weyuker   An applicable family of data flow
                                  testing criteria . . . . . . . . . . . . 1483--1498
                   M. Young and   
                   R. N. Taylor   Combining static concurrency analysis
                                  with symbolic execution  . . . . . . . . 1499--1511
                S. N. Weiss and   
                  E. J. Weyuker   An extended domain-based model of
                                  software reliability . . . . . . . . . . 1512--1524
               A. J. Gordon and   
                   R. A. Finkel   Handling timing errors in distributed
                                  programs . . . . . . . . . . . . . . . . 1525--1535

IEEE Transactions on Software Engineering
Volume 14, Number 11, November, 1988

             I. F. Akyildiz and   
                      A. Sieber   Approximate analysis of load dependent
                                  general queueing networks  . . . . . . . 1537--1545
               N. H. Gehani and   
                    W. D. Roome   Rendezvous facilities: Concurrent C and
                                  the Ada language . . . . . . . . . . . . 1546--1553
            N. De Francesco and   
                     G. Vaglini   Description for a tool specifying and
                                  prototyping concurrent programs  . . . . 1554--1564
                D. P. Sidhu and   
                 J. Aristizabal   Constructing submodule specifications
                                  and network protocols  . . . . . . . . . 1565--1577
             T. L. Casavant and   
                     J. G. Kuhl   Effects of response and stability on
                                  scheduling in distributed computing
                                  systems  . . . . . . . . . . . . . . . . 1578--1588
                    C. U. Munoz   An approach to software product testing  1589--1596
                    S. Ceri and   
         S. Crespi-Reghizzi and   
                 A. Di Maio and   
                  L. A. Lavazza   Software prototyping by relational
                                  techniques: experiences with program
                                  construction systems . . . . . . . . . . 1597--1609
                      G. Lausen   Modeling and analysis of the behavior of
                                  information systems  . . . . . . . . . . 1610--1620
      A. Maggiolo-Schettini and   
                  M. Napoli and   
                     G. Tortora   Web structures: a tool for representing
                                  and manipulating programs  . . . . . . . 1621--1639
                  S. J. Hartley   Compile-time program restructuring in
                                  multiprogrammed virtual memory systems   1640--1644
                  K. S. Lew and   
               T. S. Dillon and   
                  K. E. Forward   Software complexity and its impact on
                                  software reliability . . . . . . . . . . 1645--1655
          K. P. Mikkilineni and   
                 Y. C. Chow and   
                    S. Y. W. Su   Petri-net-based modeling and evaluation
                                  of pipelined processing of concurrent
                                  database queries . . . . . . . . . . . . 1656--1667
                G. Z. Qadah and   
                    K. B. Irani   The join algorithms on a shared-memory
                                  multiprocessor database machine  . . . . 1668--1683
                J. Banerjee and   
                     W. Kim and   
                  S. J. Kim and   
                    J. F. Garza   Clustering a DAG for CAD databases . . . 1684--1699
                   D. Rotem and   
                       A. Segev   Algorithms for multidimensional
                                  partitioning of static files . . . . . . 1700--1710
              D. S. Batoory and   
              J. R. Barnett and   
                J. F. Garza and   
                K. P. Smith and   
                 K. Tsukuda and   
             B. C. Twichell and   
                     T. E. Wise   GENESIS: an extensible database
                                  management system  . . . . . . . . . . . 1711--1730
                 C. C. Yang and   
                      G. Li and   
                    P. A. B. Ng   An improved algorithm based on subset
                                  closures for synthesizing a relational
                                  database scheme  . . . . . . . . . . . . 1731--1738

IEEE Transactions on Software Engineering
Volume 14, Number 12, December, 1988

                R. W. Selby and   
                   A. A. Porter   Learning from examples: generation and
                                  evaluation of decision trees for
                                  software resource analysis . . . . . . . 1743--1757
                L. D. Erman and   
                 J. S. Lark and   
                  F. Hayes-Roth   ABE: an environment for engineering
                                  intelligent systems  . . . . . . . . . . 1758--1770
                  E. Schoen and   
                R. G. Smith and   
                 B. G. Buchanan   Design of knowledge-based systems with a
                                  knowledge-based assistant  . . . . . . . 1771--1791
                    K. L. Clark   PARLOG and its applications  . . . . . . 1792--1804
                  J. Herath and   
               Y. Yamaguchi and   
                   N. Saito and   
                        T. Yuba   Dataflow computing models, languages,
                                  and machines for intelligence
                                  computations . . . . . . . . . . . . . . 1805--1828
             D. I. Moldovan and   
                       C. I. Wu   A hierarchical knowledge based system
                                  for airplane classification  . . . . . . 1829--1834


IEEE Transactions on Software Engineering
Volume 15, Number 1, January, 1989

               D. C. Sarkar and   
                S. C. De Sarkar   Some inference rules for integer
                                  arithmetic for verification of flowchart
                                  programs on integers . . . . . . . . . . 1--9
            A. N. Choudhary and   
               W. H. Kohler and   
            J. A. Stankovic and   
                     D. Towsley   A modified priority based probe
                                  algorithm for distributed deadlock
                                  detection and resolution . . . . . . . . 10--17
           Edward R. Omiecinski   Heuristics for Join Processing Using
                                  Nonclustered Indexes . . . . . . . . . . 18--25
              J. S. J. Chen and   
                    V. O. K. Li   Optimizing joins in fragmented database
                                  systems on a broadcast local network . . 26--38
                 S. Jajodia and   
                    D. Mutchler   A pessimistic consistency control
                                  algorithm for replicated files which
                                  achieves high availability . . . . . . . 39--46
                 T. Minoura and   
                  S. S. Iyengar   Data and time abstraction techniques for
                                  analyzing multilevel concurrent systems  47--59
                 Chao-Chih Yang   Deduction graphs: an algorithm and
                                  applications . . . . . . . . . . . . . . 60--67
                      P. Jalote   Resilient objects in broadband networks  68--72
                 C. S. Hartzman   The delay due to dynamic two-phase
                                  locking  . . . . . . . . . . . . . . . . 72--82
               M. Takahashi and   
                   Y. Kamayachi   An empirical study of a model for
                                  program error prediction . . . . . . . . 82--86
               K. J. Ottenstein   A simplified framework for reduction in
                                  strength . . . . . . . . . . . . . . . . 86--92
                      D. Davcev   A dynamic voting scheme in distributed
                                  systems  . . . . . . . . . . . . . . . . 93--97

IEEE Transactions on Software Engineering
Volume 15, Number 2, February, 1989

                    P. Armenise   A structured approach to program
                                  optimization . . . . . . . . . . . . . . 101--108
              T. K. Abdel-Hamid   The dynamics of software project
                                  staffing: a system dynamics based
                                  simulation approach  . . . . . . . . . . 109--119
         K. K. Ramakrishnan and   
                     J. S. Emer   Performance analysis of mass storage
                                  service alternatives for distributed
                                  systems  . . . . . . . . . . . . . . . . 120--133
                    D. M. Nicol   Optimal partitioning of random programs
                                  across two processors  . . . . . . . . . 134--141
                    B. C. Desai   Performance of a composite attribute and
                                  join index . . . . . . . . . . . . . . . 142--152
                    S. Ceri and   
                 G. Gottlob and   
                  G. Wiederhold   Efficient database access from Prolog    153--164
                F. L. Bauer and   
                  B. Moller and   
                 H. Partsch and   
                      P. Pepper   Formal program construction by
                                  transformations-computer-aided,
                                  intuition-guided programming . . . . . . 165--180
                 J. M. Wing and   
                    M. R. Nixon   Extending Ina Jo with temporal logic . . 181--197
                  M. S. Feather   Constructing specifications by combining
                                  parallel elaborations  . . . . . . . . . 198--208
                 G. Peterka and   
                      T. Murata   Proof procedure and answer extraction in
                                  Petri net model of logic programs  . . . 209--217
                D. B. Brown and   
             S. Maghsoodloo and   
                   W. H. Deason   A cost model for determining the optimal
                                  number of software test cases  . . . . . 218--221
           D. B. Skillicorn and   
                  J. I. Glasgow   Real-time specification using Lucid  . . 221--229

IEEE Transactions on Software Engineering
Volume 15, Number 3, March, 1989

              R. J. A. Buhr and   
                G. M. Karam and   
                C. J. Hayes and   
                 C. M. Woodside   Software CAD: a revolutionary approach   235--249
                 A. L. Wolf and   
               L. A. Clarke and   
                  J. C. Wileden   The AdaPIC tool set: supporting
                                  interface control and analysis
                                  throughout the software development
                                  process  . . . . . . . . . . . . . . . . 250--263
                      P. Jalote   Functional refinement and nested objects
                                  for object-oriented design . . . . . . . 264--270
                     R. Jha and   
               J. M. Kamrad and   
                 D. T. Cornhill   Ada program partitioning language: a
                                  notion for distributing Ada programs . . 271--280
                 R. A. Volz and   
                T. N. Mudge and   
              G. D. Buzzard and   
                    P. Krishnan   Translation and execution of distributed
                                  Ada programs: Is it still Ada? . . . . . 281--292
              A. F. Brindle and   
               R. N. Taylor and   
                   D. F. Martin   A debugger for Ada tasking . . . . . . . 293--304
              M. B. Feldman and   
                    M. L. Moran   Validating a demonstration tool for
                                  graphics-assisted debugging of Ada
                                  concurrent programs  . . . . . . . . . . 305--313
                  T. Murata and   
                 B. Shenker and   
                    S. M. Shatz   Detection of Ada static deadlocks using
                                  Petri net invariants . . . . . . . . . . 314--326
                   L. M. Ni and   
                    C. F. E. Wu   Design tradeoffs for process scheduling
                                  in shared memory multiprocessor systems  327--334
               R. F. Cmelik and   
               N. H. Gehani and   
                    W. D. Roome   Experience with multiple processor
                                  versions of Concurrent C . . . . . . . . 335--344
                   Y. Tohma and   
                K. Tokunaga and   
                  S. Nagase and   
                      Y. Murata   Structural approach to the estimation of
                                  the number of residual software faults
                                  based on the hyper-geometric
                                  distribution . . . . . . . . . . . . . . 345--355
                A. Fuggetta and   
                  C. Ghezzi and   
                   D. Mandrioli   Some consideration on real-time behavior
                                  of concurrent programs . . . . . . . . . 356--359
                      B. Sanden   The case for electric design of
                                  real-time software . . . . . . . . . . . 360--362
              P. A. Curritt and   
                    M. Dyer and   
                    H. D. Mills   Correction to `Certifying the
                                  reliability of software' (Jan. 1986
                                  3--11) . . . . . . . . . . . . . . . . . 362

IEEE Transactions on Software Engineering
Volume 15, Number 4, April, 1989

                  G. Florin and   
                      S. Natkin   Necessary and sufficient ergodicity
                                  condition for open synchronized queueing
                                  networks . . . . . . . . . . . . . . . . 367--380
                 P. J. Haas and   
                  G. S. Shedler   Stochastic Petri net representation of
                                  discrete event simulations . . . . . . . 381--393
            J. Bechta Dugan and   
                      G. Ciardo   Stochastic Petri net analysis of a
                                  replicated file system . . . . . . . . . 394--401
             N. F. Schneidewind   Distributed system software design
                                  paradigm with application to computer
                                  networks . . . . . . . . . . . . . . . . 402--412
                D. P. Sidhu and   
                    T. K. Leung   Formal methods for protocol testing: a
                                  detailed study . . . . . . . . . . . . . 413--426
               M. A. Linton and   
                    R. W. Quong   A macroscopic profile of program
                                  compilation and linking  . . . . . . . . 427--436
                 D. M. Dias and   
                 B. R. Iyer and   
             J. T. Robinson and   
                       P. S. Yu   Integrated concurrency-coherency
                                  controls for multisystem data sharing    437--448
               J. A. Larson and   
              S. B. Navathe and   
                     R. Elmasri   A theory of attributed equivalence in
                                  databases with application to schema
                                  integration  . . . . . . . . . . . . . . 449--463
               A. U. Tansel and   
                M. E. Arkun and   
                   G. Ozsoyoglu   Time-by-example query language for
                                  historical databases . . . . . . . . . . 464--478
                   A. Dogac and   
                 B. Yuruten and   
                S. Spaccapietra   A generalized expert system for database
                                  design . . . . . . . . . . . . . . . . . 479--491
                  M. Ahamad and   
                    M. H. Ammar   Performance characterization of
                                  quorum-consensus algorithms for
                                  replicated data  . . . . . . . . . . . . 492--496
               S. H. Zweben and   
                  J. S. Gourlay   Comments, with reply, on ``Axiomatizing
                                  software test data adequacy'' by E. J.
                                  Weyuker  . . . . . . . . . . . . . . . . 496--501

IEEE Transactions on Software Engineering
Volume 15, Number 5, May, 1989

                S. K. Chang and   
               M. J. Tauber and   
                      B. Yu and   
                       J. S. Yu   A visual language compiler . . . . . . . 506--525
                      P. Jalote   Testing the completeness of
                                  specifications . . . . . . . . . . . . . 526--531
                B. Hailpern and   
                   T. Huynh and   
                      G. Revesz   Comparing two functional programming
                                  systems  . . . . . . . . . . . . . . . . 532--542
                 W. H. Shaw and   
               J. W. Howatt and   
               R. S. Maness and   
                   D. M. Miller   A software science model of compile time 543--549
                H. D. Mills and   
               V. R. Basili and   
               J. D. Gannon and   
                   R. G. Hamlet   Mathematical principles for a first
                                  course in software engineering . . . . . 550--559
                R. T. Jacob and   
                     I. P. Page   Synthesis of mutual exclusion solutions
                                  based on binary semaphores . . . . . . . 560--568
                  P. M. Lenders   Distributed computing with single
                                  read-single write variables  . . . . . . 569--574
                  W. S. Luk and   
                        F. Ling   An analytic/empirical study of
                                  distributed sorting on a local area
                                  network  . . . . . . . . . . . . . . . . 575--586
                      Z. Xu and   
                       K. Hwang   Molecule: a language construct for
                                  layered development of parallel programs 587--599
                    S. P. Ghosh   Numerical operations on a relational
                                  database . . . . . . . . . . . . . . . . 600--610
                     G. Barrett   Formal methods applied to a
                                  floating-point number system . . . . . . 611--621
                 J. L. Baer and   
                      Y. B. Lin   Improving quicksort performance with a
                                  codeword data structure  . . . . . . . . 622--631
               D. A. Varvel and   
                     L. Shapiro   The computational completeness of
                                  extended database query languages  . . . 632--638
           K. B. Lakshmanan and   
            K. Thulasiraman and   
                   M. A. Comeau   An efficient distributed protocol for
                                  finding shortest paths in networks with
                                  negative weights . . . . . . . . . . . . 639--644
                       I. Cidon   An efficient distributed knot detection
                                  algorithm  . . . . . . . . . . . . . . . 644--649
                 R. K. Lind and   
                    K. Vairavan   An experimental investigation of
                                  software metrics and their relationship
                                  to software development effort . . . . . 649--653
               L. Ciminiera and   
                   A. Valenzano   Authentication mechanisms in
                                  microprocessor-based local area networks 654--658
                      J. Wu and   
                E. B. Fernandez   A simplification of a conversation
                                  design scheme using Petri nets . . . . . 658--660

IEEE Transactions on Software Engineering
Volume 15, Number 6, June, 1989

                   J. Magee and   
                  J. Kramer and   
                      M. Sloman   Constructing distributed systems in
                                  Conic  . . . . . . . . . . . . . . . . . 663--675
               R. A. Finkel and   
                M. L. Scott and   
                   Y. Artsy and   
                    H. Y. Chang   Experience with Charlotte: simplicity
                                  and function in a distributed operating
                                  system . . . . . . . . . . . . . . . . . 676--685
                 A. R. Tripathi   An overview of the Nexus distributed
                                  operating system design  . . . . . . . . 686--695
                  M. Y. Lai and   
            W. K. Wilkinson and   
                       V. Lanin   On distributing JASMIN's optimistic
                                  multiversioning page manager . . . . . . 696--704
                   A. Kumar and   
                 M. Stonebraker   Performance considerations for an
                                  operating system transaction manager . . 705--714
                      K. H. Kim   An approach to experimental evaluation
                                  of real-time fault-tolerant distributed
                                  computing schemes  . . . . . . . . . . . 715--725
                B. Bhargava and   
                       J. Riedl   The Raid distributed database system . . 726--736
                     S. J. Zeil   Perturbation techniques for detecting
                                  domain errors  . . . . . . . . . . . . . 737--746
               C. L. Ramsey and   
                   V. R. Basili   An evaluation of expert systems for
                                  software engineering management  . . . . 747--759
                 C. C. Yang and   
              J. J. Y. Chen and   
                     H. L. Chau   Algorithms for constructing minimal
                                  deduction graphs . . . . . . . . . . . . 760--770
               B. Jayaraman and   
                       G. Gupta   EQL: the language and its implementation 771--779
                   C. T. Yu and   
                  K. C. Guh and   
                   D. Brill and   
                  A. L. P. Chen   Partition strategy for distributed query
                                  processing in fast local networks  . . . 780--793
            Y. Manolopoulos and   
                  J. G. Kollias   Expressions for completely and partly
                                  unsuccessful batched search of
                                  sequential and tree-structured files . . 794--799
              R. O. Onvural and   
                   H. G. Perros   Approximate throughput analysis of
                                  cyclic queueing networks with finite
                                  buffers  . . . . . . . . . . . . . . . . 800--808
                H. H. Ammar and   
                 S. M. R. Islam   Time scale decomposition of a class of
                                  generalized stochastic Petri net models  809--820
                         C. May   The parallel assignment problem
                                  redefined  . . . . . . . . . . . . . . . 821--824

IEEE Transactions on Software Engineering
Volume 15, Number 7, July, 1989

              M. P. Herlihy and   
                 M. S. McKendry   Timestamp-based orphan elimination . . . 825--831
           M. Ajmone Marsan and   
                   G. Balbo and   
                  A. Bobbio and   
                  G. Chiola and   
                   G. Conte and   
                      A. Cumani   The effect of execution policies on the
                                  semantics and analysis of stochastic
                                  Petri nets . . . . . . . . . . . . . . . 832--846
                 R. Gusella and   
                       S. Zatti   The accuracy of the clock
                                  synchronization achieved by TEMPO in
                                  Berkeley UNIX 4.3BSD . . . . . . . . . . 847--853
                 J. L. Wolf and   
                 D. M. Dias and   
                 B. R. Iyer and   
                       P. S. Yu   Multisystem coupling by a combination of
                                  data sharing and data partitioning . . . 854--860
                      B. Samadi   TUNEX: a knowledge-based system for
                                  performance tuning of the UNIX operating
                                  system . . . . . . . . . . . . . . . . . 861--874
                     A. C. Shaw   Reasoning about time in higher-level
                                  language software  . . . . . . . . . . . 875--889
               B. Lazzerini and   
                    L. Lopriore   Abstraction mechanisms for event control
                                  in program debugging . . . . . . . . . . 890--901
                B. W. Boehm and   
                        R. Ross   Theory-W software project management
                                  principles and examples  . . . . . . . . 902--916
               L. M. Wegner and   
                  J. I. Teuhola   The external Heapsort  . . . . . . . . . 917--925
                  Liu Lingzhong   Comments on ``A distributed scheme for
                                  detecting communication deadlocks'' by
                                  N. Natarajan . . . . . . . . . . . . . . 926
                      B. Sanden   Correction to `The case for electric
                                  design of real-time software'  . . . . . 926

IEEE Transactions on Software Engineering
Volume 15, Number 8, August, 1989

           Guang-Huei Chiou and   
                 Wen-Tsuen Chen   Secure broadcasting using the secure
                                  lock . . . . . . . . . . . . . . . . . . 929--934
             S. P. Hufnagel and   
                   J. C. Browne   Performance properties of vertically
                                  partitioned object-oriented systems  . . 935--946
                 M. L. Fontenot   Software congestion, mobile servers, and
                                  the hyperbolic model . . . . . . . . . . 947--962
                 S. K. Chen and   
                 W. T. Tsai and   
            M. B. Thuraisingham   Recovery point selection on a reverse
                                  binary tree task model . . . . . . . . . 963--976
         R. K. Shyamasundar and   
                 J. W. Thatcher   Language constructs for specifying
                                  concurrency in CDL . . . . . . . . . . . 977--993
                  U. Halici and   
                       A. Dogac   Concurrency control in distributed
                                  databases through time intervals and
                                  short-term locks . . . . . . . . . . . . 994--1003
              D. W. Cornell and   
                       P. S. Yu   On optimal site assignment for relations
                                  in the distributed database environment  1004--1009
                      J. I. Aoe   An efficient implementation of static
                                  string pattern matching machines . . . . 1010--1016
                      A. Kusiak   Expert systems and optimization  . . . . 1017--1020

IEEE Transactions on Software Engineering
Volume 15, Number 9, September, 1989

                  C. Y. Lin and   
                   R. R. Levary   Computer-aided software development
                                  process design . . . . . . . . . . . . . 1025--1037
               G. Ozsoyoglu and   
                        H. Wang   A relational calculus with set
                                  operators, its safety, and equivalent
                                  graphical languages  . . . . . . . . . . 1038--1052
                    R. Bagrodia   Process synchronization: design and
                                  performance evaluation of distributed
                                  algorithms . . . . . . . . . . . . . . . 1053--1065
                      J. I. Aoe   An efficient digital search algorithm by
                                  using a double-array structure . . . . . 1066--1077
                   J. Etkin and   
                    J. A. Zinky   Development life cycle of computer
                                  networks: the executable model approach  1078--1089
               S. A. Mamrak and   
            M. S. Kaelbling and   
             C. K. Nicholas and   
                       M. Share   Chameleon: a system for solving the
                                  data-translation problem . . . . . . . . 1090--1108
                 D. J. Troy and   
                   C. T. Yu and   
                       W. Zhang   Linearization of nonlinear recursive
                                  rules  . . . . . . . . . . . . . . . . . 1109--1119
                A. Malhotra and   
            H. M. Markowitz and   
             Y. Tsalalikhin and   
                D. P. Pazel and   
                    L. M. Burns   An entity-relationship programming
                                  language . . . . . . . . . . . . . . . . 1120--1130
                   J. A. Lehman   An empirical comparison of textual and
                                  graphical data structure documentation
                                  for Cobol programs . . . . . . . . . . . 1131--1135
              Chi-Sung Laih and   
                  Lein Harn and   
                   Jau-Yien Lee   On the design of a single-key-lock
                                  mechanism based on Newton's
                                  interpolating polynomial . . . . . . . . 1135--1137

IEEE Transactions on Software Engineering
Volume 15, Number 10, October, 1989

                K. Sugihara and   
                  T. Kikuno and   
                     N. Yoshida   A Meeting Scheduler for Office
                                  Automation . . . . . . . . . . . . . . . 1141--1146
               A. Thomasian and   
                   In Kyung Ryu   A Recursive Solution Method to Analyze
                                  the Performance of Static Locking
                                  Systems  . . . . . . . . . . . . . . . . 1147--1156
              Sang Hyuk Son and   
                 A. K. Agrawala   Distributed Checkpointing for Globally
                                  Consistent States of Databases . . . . . 1157--1167
                Xian-he Sun and   
                N. N. Kamel and   
                       L. M. Ni   Processing Implication on Queries  . . . 1168--1175
                     C. H. Kung   Conceptual Modeling in the Context of
                                  Development  . . . . . . . . . . . . . . 1176--1187
               Kang G. Shin and   
              C. M. Krishna and   
                  Yann-hang Lee   Optimal Dynamic Control of Resources in
                                  a Distributed System . . . . . . . . . . 1188--1198
               R. D. Banker and   
                  C. F. Kemerer   Scale Economies in New Software
                                  Development  . . . . . . . . . . . . . . 1199--1205
                 S. Balsamo and   
                  L. Donatiello   On the Cycle Time Distribution in a
                                  Two-Stage Cyclic Network with Blocking   1206--1216
                 P. Ciaccia and   
                   M. R. Scalas   Optimization Strategies for Relational
                                  Queries  . . . . . . . . . . . . . . . . 1217--1235
                  M. Ruschitzka   Heterogeneous Data Translations Based on
                                  Environment Grammars . . . . . . . . . . 1236--1251
              Wei-Chung Hsu and   
              C. N. Fischer and   
                  J. R. Goodman   On the Minimization of Loads/Stores in
                                  Local Register Allocation  . . . . . . . 1252--1260
                  H. Chetto and   
                      M. Chetto   Some Results of the Earliest Deadline
                                  Scheduling Algorithm . . . . . . . . . . 1261--1269
                 V. R. Iyer and   
                    H. A. Sholl   Sofiware Partitioning for Distributed,
                                  Sequential, Pipelined Applications . . . 1270--1279
              Lung-chun Liu and   
                    E. Horowitz   A Formal Model for Software Project
                                  Management . . . . . . . . . . . . . . . 1280--1293
               D. B. Bisant and   
                     J. R. Lyle   A Two-Person Inspection Method to
                                  Improve Prog ramming Productivity  . . . 1294--1304
             I. F. Akyildiz and   
                   H. Von Brand   Central Server Models with Multiple Job
                                  Classes, State Dependent Routing, and
                                  Rejection Blocking . . . . . . . . . . . 1305--1312

IEEE Transactions on Software Engineering
Volume 15, Number 11, November, 1989

               L. A. Clarke and   
               A. Podgurski and   
           D. J. Richardson and   
                     S. J. Zeil   A formal evaluation of data flow path
                                  selection criteria . . . . . . . . . . . 1318--1332
                 K. Shannon and   
                   R. Snodgrass   Mapping the Interface Description
                                  Language type model into C . . . . . . . 1333--1346
             G. V. Bochmann and   
                 R. Dssouli and   
                     J. R. Zhao   Trace analysis for conformance and
                                  arbitration testing  . . . . . . . . . . 1347--1356
                J. P. Gupta and   
               S. C. Winter and   
                   D. R. Wilson   CTDNet --- a mechanism for the
                                  concurrent execution of lambda graphs    1357--1367
                  D. Sarkar and   
                S. C. De Sarkar   A set of inference rules for quantified
                                  formula handling and array handling in
                                  verification of programs over integers   1368--1381
                   W. R. Bevier   Kit: a study in operating system
                                  verification . . . . . . . . . . . . . . 1382--1396
                      H. Ossher   A case study in structure specification:
                                  a grid description of Scribe . . . . . . 1397--1416
              M. Evangelist and   
                 N. Francez and   
                        S. Katz   Multiparty interactions for interprocess
                                  communication and synchronization  . . . 1417--1426
              D. Fernandez-Baca   Allocating modules to processors in a
                                  distributed system . . . . . . . . . . . 1427--1436
              T. H. Merrett and   
                   N. Laliberte   Including scalars in a programming
                                  language based on the relational algebra 1437--1443
              M. M. Theimer and   
                    K. A. Lantz   Finding idle machines in a
                                  workstation-based distributed system . . 1444--1458
                         A. Hac   A distributed algorithm for performance
                                  improvement through file replication,
                                  file migration, and process migration    1459--1470
                G. M. Karam and   
             C. M. Stanczyk and   
                     G. W. Bond   Critical races in Ada programs . . . . . 1471--1480
            S. S. Brilliant and   
               J. C. Knight and   
                  N. G. Leveson   The consistent comparison problem in
                                  $N$-version software . . . . . . . . . . 1481--1485
                         H. Joe   Statistical inference for
                                  general-order-statistics and
                                  nonhomogeneous-Poisson-process software
                                  reliability models . . . . . . . . . . . 1485--1490
                   A. Chung and   
                    D. P. Sidhu   On conditions for defining a closed
                                  cover to verify progress for
                                  communicating finite state machines  . . 1491--1494

IEEE Transactions on Software Engineering
Volume 15, Number 12, December, 1989

            M. L. Dertouzos and   
                      A. K. Mok   Multiprocessor online scheduling of
                                  hard-real-time tasks . . . . . . . . . . 1497--1506
                N. R. Howes and   
                   A. C. Weaver   Measurements of Ada overhead in
                                  OSI-style communications systems . . . . 1507--1517
                   R. S. Sandhu   Recognizing immediacy in an $N$-tree
                                  hierarchy and its application to
                                  protection groups  . . . . . . . . . . . 1518--1525
         W. H. Bahaa-El-Din and   
              F. B. Bastani and   
                     J. E. Teng   Performance analysis of periodic and
                                  concurrent data structure maintenance
                                  strategies for network servers . . . . . 1526--1536
              L. L. Pollock and   
                    M. L. Soffa   An incremental version of iterative data
                                  flow analysis  . . . . . . . . . . . . . 1537--1549
                  D. Sarkar and   
                S. C. De Sarkar   A theorem prover for verifying iterative
                                  programs over integers . . . . . . . . . 1550--1566
                 G. Bernard and   
                    A. Duda and   
                  Y. Haddad and   
                      G. Harrus   Primitives for distributed computing in
                                  a heterogeneous local area network
                                  environment  . . . . . . . . . . . . . . 1567--1578
          M. V. Devarakonda and   
                     R. K. Iyer   Predictability of process resource
                                  usage: a measurement-based study on UNIX 1579--1586
               B. E. Wojcik and   
                   Z. M. Wojcik   Sufficient condition for a communication
                                  deadlock and distributed deadlock
                                  detection  . . . . . . . . . . . . . . . 1587--1595
              B. Littlewood and   
                   D. R. Miller   Conceptual modeling of coincident
                                  failures in multiversion software  . . . 1596--1614
                 C. Q. Yang and   
                   B. P. Miller   Performance measurement for parallel and
                                  distributed programs: a structured and
                                  automatic approach . . . . . . . . . . . 1615--1629
                L. Felician and   
                     G. Zalateu   Validating Halstead's theory for Pascal
                                  programs . . . . . . . . . . . . . . . . 1630--1632
                   S. Chowdhury   The mean resequencing delay for M/H$_K$
                                  /$ \infty $ systems  . . . . . . . . . . 1633--1638
                    J. A. Hager   Software cost reduction methods in
                                  practice . . . . . . . . . . . . . . . . 1638--1644
            A. N. Choudhary and   
               W. H. Kohler and   
            J. A. Stankovic and   
                     D. Towsley   Correction to ``A modified priority
                                  based probe algorithm for distributed
                                  deadlock detection and resolution' (A.
                                  N. Choudhary et al.) . . . . . . . . . . 1644--1644


IEEE Transactions on Software Engineering
Volume 16, Number 3, March, 1990

                    Y. Hirakawa   Comments, with reply, on ``On the
                                  projection method for protocol
                                  verification'' by T.-Y. Cheung . . . . . 370--371

IEEE Transactions on Software Engineering
Volume 16, Number 4, April, 1990

                      F. Kaudel   Comments on ``Allocating programs
                                  containing branches and loops within a
                                  multiple processor system'' by D.
                                  Towsley  . . . . . . . . . . . . . . . . 471

IEEE Transactions on Software Engineering
Volume 16, Number 12, December, 1990

                    G. M. Karam   Comments on ``Measurements of Ada
                                  overhead in OSI-style communications
                                  systems''  . . . . . . . . . . . . . . . 1435--1439
              C. M. McNamee and   
                   R. A. Olsson   Comments on ``Critical races in Ada
                                  programs'' . . . . . . . . . . . . . . . 1439


IEEE Transactions on Software Engineering
Volume 22, Number 4, April, 1996

                   Lin Lin Wang   Thorough investigation into ``An
                                  improved algorithm based on subset
                                  closures for synthesizing a relational
                                  database scheme''  . . . . . . . . . . . 271--274