Last update:
Wed May 26 07:06:49 MDT 2021
D. Towsley Allocating programs containing branches
and loops within a multiple processor
system . . . . . . . . . . . . . . . . . 1018--1024
T. Y. Cheung On the projection method for protocol
verification . . . . . . . . . . . . . . 1088--1089
C. C. Yang and
G. Li and
P. A. B. Ng An improved algorithm based on subset
closures for synthesizing a relational
database scheme . . . . . . . . . . . . 1731--1738
G. M. Karam and
C. M. Stanczyk and
G. W. Bond Critical races in Ada programs . . . . . 1471--1480
N. R. Howes and
A. C. Weaver Measurements of Ada overhead in
OSI-style communications systems . . . . 1507--1517
C. P. Gerrard and
D. Coleman and
R. M. Gallimore Formal specification and design time
testing . . . . . . . . . . . . . . . . 1--12
Guo-Jie Li and
B. W. Wah Computational efficiency of parallel
combinatorial OR-tree searches . . . . . 13--31
E. Barcucci and
R. Pinzani Optimal selection of secondary indexes 32--38
R. G. Willson and
B. H. Krogh Petri net tools for the specification
and analysis of discrete controllers . . 39--50
L. K. Dillon Verifying general safety properties of
Ada tasking programs . . . . . . . . . . 51--63
G. C. Low and
D. R. Jeffery Function points in the estimation and
evaluation of the software process . . . 64--71
W. E. Howden Comments analysis and programming errors 72--81
R. C. De Vries Reducing null messages in Misra's
distributed discrete event simulation
method . . . . . . . . . . . . . . . . . 82--91
S. B. Yadav Control and definition modularization:
an improved software design technique
for organizing programs . . . . . . . . 92--99
C. K. Chang Bidding against competitors . . . . . . 100--104
J. C. Browne and
T. Lee and
J. Werth Experimental evaluation of a
reusability-oriented parallel
programming environment . . . . . . . . 111--120
E. J. Weyuker The cost of data flow testing: an
empirical study . . . . . . . . . . . . 121--128
B. G. Ryder and
W. Landi and
H. D. Pande Profiling an incremental data flow
analysis algorithm . . . . . . . . . . . 129--140
Y. Levendel Reliability analysis of large software
systems: defect data modeling . . . . . 141--152
J. P. J. Kelly and
S. C. Murphy Achieving dependability throughout the
development process: a distributed
software experiment . . . . . . . . . . 153--165
J. Arlat and
M. Aguera and
L. Amat and
Y. Crouzet and
J. C. Fabre and
J. C. Laprie and
E. Martins and
D. Powell Fault injection for dependability
validation: a methodology and some
applications . . . . . . . . . . . . . . 166--182
V. Balasubramanian and
P. Banerjee Tradeoffs in the design of efficient
algorithm-based error detection schemes
for hypercube multiprocessors . . . . . 183--196
D. Haban and
D. Wybranietz A hybrid monitor for behavior and
performance analysis of distributed
systems . . . . . . . . . . . . . . . . 197--211
M. H. Woodbury and
K. G. Shin Measurement and analysis of workload
effects on fault latency in real-time
systems . . . . . . . . . . . . . . . . 212--216
K. Gallivan and
D. Gannon and
W. Jalby and
A. Malony and
H. Wijshoff Experimentally characterizing the
behavior of multiprocessor memory
systems: a case study . . . . . . . . . 216--223
N. Gorla and
A. C. Benander and
B. A. Benander Debugging effort estimation using
software metrics . . . . . . . . . . . . 223--231
B. Mortazavi Performance of MAP in the remote
operation of a CNC . . . . . . . . . . . 231--237
S. S. Brilliant and
J. C. Knight and
N. G. Leveson Analysis of faults in an $N$-version
software experiment . . . . . . . . . . 238--247
D. W. Cornell and
P. S. Yu An effective approach to vertical
partitioning for physical design of
relational databases . . . . . . . . . . 248--258
F. A. Feldman A new spectral test for nonrandomness
and the DES . . . . . . . . . . . . . . 261--267
K. M. Olender and
L. J. Osterweil Cecil: a sequencing constraint language
for automatic static analysis generation 268--280
J. L. Gaudiot and
A. Sohn Data-driven parallel production systems 281--293
J. R. Cordy and
N. L. Eliot and
M. G. Robertson TuringTool: a user interface to aid in
the software maintenance task . . . . . 294--301
T. Ibaraki and
T. Kameda and
N. Katoh Multiversion cautious schedulers for
database concurrency control . . . . . . 302--315
W. T. Tsai and
D. Volovik and
T. F. Keefe Automated test case generation for
programs specified by relational algebra
queries . . . . . . . . . . . . . . . . 316--324
Y. F. Chen and
M. Y. Nishimoto and
C. V. Ramamoorthy The C information abstraction system . . 325--334
S. K. Debray and
D. S. Warren Towards banishing the cut from Prolog 335--349
V. F. Nicola and
A. Goyal Modeling of correlated failures and
community error recovery in multiversion
software . . . . . . . . . . . . . . . . 350--359
J. Xu and
D. L. Parnas Scheduling processes with release times,
deadlines, precedence and exclusion
relations . . . . . . . . . . . . . . . 360--369
Y. Hirakawa Comments, with reply, on ``On the
projection method for protocol
verification'' by T.-Y. Cheung . . . . . 370--371
L. Y. Liu and
R. K. Shyamasundar Static analysis of real-time distributed
systems . . . . . . . . . . . . . . . . 373--388
J. M. Bishop The effect of data abstraction on loop
programming techniques . . . . . . . . . 389--402
D. Harel and
H. Lachover and
A. Naamad and
A. Pnueli and
M. Politi and
R. Sherman and
A. Shtull-Trauring and
M. Trakhtenbrot STATEMATE: a working environment for the
development of complex reactive systems 403--414
A. Itai and
S. Kutten and
Y. Wolfstahl and
S. Zaks Optimal distributed $t$-resilient
election in complete networks . . . . . 415--420
R. Gupta and
M. L. Soffa Region scheduling: an approach for
detecting and redistributing parallelism 421--431
N. G. Leveson and
S. S. Cha and
J. C. Knight and
T. J. Shimeall The use of self checks and voting in
software error detection: an empirical
study . . . . . . . . . . . . . . . . . 432--443
Y. B. Shieh and
D. Ghosal and
P. R. Chintamaneni and
S. K. Tripathi Modeling of hierarchical distributed
systems with fault-tolerance . . . . . . 444--457
S. Brocklehurst and
P. Y. Chan and
B. Littlewood and
J. Snell Recalibrating software reliability
models . . . . . . . . . . . . . . . . . 458--470
F. Kaudel Comments on ``Allocating programs
containing branches and loops within a
multiple processor system'' by D.
Towsley . . . . . . . . . . . . . . . . 471
R. A. Nicholl Unreachable states in model-oriented
specifications . . . . . . . . . . . . . 472--477
D. Towsley Correction to ``Allocating programs
containing branches and loops within a
multiple processor system'' . . . . . . 472
M. H. Eich and
S. M. Garard The performance of flow graph locking 477--483
D. Callahan and
A. Carle and
M. W. Hall and
K. Kennedy Constructing the procedure call
multigraph . . . . . . . . . . . . . . . 483--487
G. M. Karam Computational improvements in Prolog
applications by predicate variable
pointers . . . . . . . . . . . . . . . . 490--497
L. E. Moser Data dependency graphs for Ada programs 498--509
L. A. Laranjeira Software size estimation of
object-oriented systems . . . . . . . . 510--522
T. Suzuki and
S. M. Shatz and
T. Murata A protocol modeling and verification
approach based on a specification
language and Petri nets . . . . . . . . 523--536
D. Hoffman On criteria for module interfaces . . . 537--542
C. Ding and
P. Mateti A framework for the automated drawing of
data structure diagrams . . . . . . . . 543--557
J. K. Mullin Optimal semijoins for distributed
database systems . . . . . . . . . . . . 558--560
D. McCullough A hookup theorem for multilevel security 563--568
C. R. Tsai and
V. D. Gligor and
C. S. Chandersekaran On the identification of covert storage
channels in secure systems . . . . . . . 569--580
C. F. Yu and
V. D. Gligor A specification and verification method
for preventing denial of service . . . . 581--592
T. F. Lunt and
D. E. Denning and
R. R. Schell and
M. Heckman and
W. R. Shockley The SeaView security model . . . . . . . 593--607
J. L. Berger and
J. Picciotto and
J. P. L. Woodward and
P. T. Cummings Compartmented mode workstation:
prototype highlights . . . . . . . . . . 608--618
S. R. White and
L. Comerford ABYSS: an architecture for software
protection . . . . . . . . . . . . . . . 619--629
D. Hildum and
J. Cohen A language for specifying program
transformations . . . . . . . . . . . . 630--638
S. Leong and
S. Jodis and
K. Sullivan and
O. Jiang and
P. A. D. de Maine A transportable programming language
(TPL) system. II. The bifunctional
compiler system . . . . . . . . . . . . 639--646
W. P. Lu and
M. K. Sundareshan A model for multilevel security in
computer networks . . . . . . . . . . . 647--659
M. Dubois and
C. Scheurich Memory access dependencies in
shared-memory multiprocessors . . . . . 660--673
D. Sarkar and
N. Deo Estimating the speedup in parallel
parsing . . . . . . . . . . . . . . . . 677--683
I. K. Ryu and
A. Thomasian Performance analysis of dynamic locking
with the no-waiting policy . . . . . . . 684--698
C. E. Houstics Module allocation of real-time
applications to distributed systems . . 699--709
J. W. Stamos and
D. K. Gifford Implementing remote evaluation . . . . . 710--722
M. G. Burke and
B. G. Ryder A critical analysis of incremental
iterative data flow analysis algorithms 723--728
L. J. Chmura and
A. F. Norcio and
T. J. Wicinski Evaluating software design processes by
analyzing change data over time . . . . 729--740
D. Hemmendinger Specifying Ada server tasks with
executable formal grammars . . . . . . . 741--754
S. S. Lam and
A. U. Shankar A relational notation for state
transition systems . . . . . . . . . . . 755--775
V. M. Markowitz and
J. A. Makowsky Identifying extended entity-relationship
object structures in relational schemas 777--790
B. Ciciani and
D. M. Dias and
B. R. Iyer and
P. S. Yu A hybrid distributed centralized system
structure for transaction processing . . 791--806
V. F. Nicola and
J. M. van Spanje Comparative analysis of different models
of checkpointing and recovery . . . . . 807--821
V. De Antonellis and
B. Zonta A disciplined approach to office
analysis . . . . . . . . . . . . . . . . 822--828
G. M. Karam and
R. J. A. Buhr Starvation and critical race analyzers
for Ada . . . . . . . . . . . . . . . . 829--843
L. J. Morell A theory of fault-based testing . . . . 844--857
A. Valenzano and
P. Montuschi and
L. Ciminiera Some properties of timed token medium
access protocols . . . . . . . . . . . . 858--869
B. Korel Automated software test data generation 870--879
J. C. Huang State constraints and pathwise
decomposition of programs . . . . . . . 880--896
J. J. P. Tsai and
K. Y. Fang and
H. Y. Chen and
Y. D. Bi A noninterference monitoring and replay
mechanism for real-time software testing
and debugging . . . . . . . . . . . . . 897--916
Luqi A graph model for software evolution . . 917--927
A. P. Moore The specification and verified
decomposition of system requirements
using CSP . . . . . . . . . . . . . . . 932--948
F. K. Hanna and
N. Daeche and
M. Longley Specification and verification using
dependent types . . . . . . . . . . . . 949--964
A. Podgurski and
L. A. Clarke A formal model of program dependences
and its implications for software
testing, debugging, and maintenance . . 965--979
M. Moriconi and
T. C. Winkler Approximate reasoning about the semantic
effects of program changes . . . . . . . 980--992
A. J. Camilleri Mechanizing CSP trace theory in higher
order logic . . . . . . . . . . . . . . 993--1004
D. M. Goldschlag Mechanically verifying concurrent
programs with the Boyer--Moore prover 1005--1023
D. R. Smith KIDS: a semiautomatic program
development system . . . . . . . . . . . 1024--1043
S. J. Garland and
J. V. Guttag and
J. J. Horning Debugging Larch shared language
specifications . . . . . . . . . . . . . 1044--1057
D. Guaspari and
C. Marceau and
W. Polak Formal verification of Ada programs . . 1058--1075
J. M. Wing Using Larch to specify Avalon/C++
objects . . . . . . . . . . . . . . . . 1076--1088
K. T. Narayana and
S. Dharap Formal specification of a look manager 1089--1103
R. V. Rubin and
J. Walker and
E. J. Golin Early experience with the Visual
Programmer's WorkBench . . . . . . . . . 1107--1121
C. Crimi and
A. Guercio and
G. Pacini and
G. Tortora and
M. Tucci Automating visual language generation 1122--1135
S. K. Chang A visual language compiler for
information retrieval by visual
reasoning . . . . . . . . . . . . . . . 1136--1149
M. Angelaccio and
T. Catarci and
G. Santucci QBD*: a graphical query language with
recursion . . . . . . . . . . . . . . . 1150--1163
M. Eisenstadt and
J. Domingue and
T. Rajan and
E. Motta Visual knowledge engineering . . . . . . 1164--1177
M. Hirakawa and
M. Tanaka and
T. Ichikawa An iconic programming system, HI-VISUAL 1178--1184
A. Heydon and
M. W. Maimone and
J. D. Tygar and
J. M. Wing and
A. M. Zaremski Miro: visual specification of security 1185--1197
D. W. Craig and
C. M. Woodside The rejection rate for tasks with random
arrivals, deadlines, and preemptive
scheduling . . . . . . . . . . . . . . . 1198--1208
G. N. Neufeld and
Y. Yang The design and implementation of an
ASN.1-C compiler . . . . . . . . . . . . 1209--1220
C. V. Ramamoorthy and
Y. Usuda and
A. Prakash and
W. T. Tsai The evolution support environment system 1225--1234
M. Degl'Innocenti and
G. L. Ferrari and
G. Pacini and
F. Turini RSF: a formalism for executable
requirement specifications . . . . . . . 1235--1246
B. Hailpern and
H. Ossher Extending objects to support multiple
interfaces and access control . . . . . 1247--1257
M. V. Mannino and
J. J. Choi and
D. S. Batory The object-oriented functional data
language . . . . . . . . . . . . . . . . 1258--1272
I. Suzuki Formal analysis of the alternating bit
protocol by temporal Petri nets . . . . 1273--1281
Y. Wand and
R. Weber An ontological model of an information
system . . . . . . . . . . . . . . . . . 1282--1292
J. Kramer and
J. Magee The evolving philosophers problem:
dynamic change management . . . . . . . 1293--1306
G. Becker and
L. Camarinopoulos A Bayesian estimation method for the
failure rate of a possibly correct
program . . . . . . . . . . . . . . . . 1307--1310
V. C. Barbosa Strategies for the prevention of
communication deadlocks in distributed
parallel programs . . . . . . . . . . . 1311--1316
M. Singhal Update transport: a new technique for
update synchronization in replicated
database systems . . . . . . . . . . . . 1325--1336
D. H. Pitt and
D. E. Freestone The derivation of conformance tests from
LOTOS specifications . . . . . . . . . . 1337--1343
J. Heering and
P. Klint and
J. Rekers Incremental generation of parsers . . . 1344--1351
D. A. Lamb Specification of iterators . . . . . . . 1352--1360
G. C. Roman and
H. C. Cunningham Mixed programming metaphors in a shared
dataspace model of concurrency . . . . . 1361--1373
D. Haban and
K. G. Shin Application of real-time monitoring to
scheduling tasks with random execution
times . . . . . . . . . . . . . . . . . 1374--1389
M. A. Al-Mouhamed Lower bound on the number of processors
and time for scheduling precedence
graphs with communication costs . . . . 1390--1401
D. Hamlet and
R. Taylor Partition testing does not inspire
confidence [program testing] . . . . . . 1402--1411
M. H. Erdogmus and
R. Johnston On the specification and synthesis of
communicating processes . . . . . . . . 1412--1426
J. Milewski Functional data structures as updatable
objects . . . . . . . . . . . . . . . . 1427--1432
S. D. Lang and
Y. Manolopoulos Efficient expressions for completely and
partly unsuccessful batched search of
tree-structured files . . . . . . . . . 1433--1435
G. M. Karam Comments on ``Measurements of Ada
overhead in OSI-style communications
systems'' . . . . . . . . . . . . . . . 1435--1439
C. M. McNamee and
R. A. Olsson Comments on ``Critical races in Ada
programs'' . . . . . . . . . . . . . . . 1439
L. L. Constantine Comments, with reply, on ``On criteria
for module interfaces'' by D. Hoffman 1440
I. Nakata and
M. Sassa Programming with streams in a
Pascal-like language . . . . . . . . . . 1--9
L. B. Protsko and
P. G. Sorenson and
J. P. Tremblay and
D. A. Schaefer Towards the automatic generation of
software diagrams . . . . . . . . . . . 10--21
N. Roussopoulos and
L. Mark and
T. Sellis and
C. Faloutsos An architecture for high performance
engineering information systems . . . . 22--33
B. A. Blake and
K. Schwan Experimental evaluation of a real-time
scheduler for a multiprocessor system 34--44
K. C. Tai and
R. H. Carver and
E. E. Obaid Debugging concurrent Ada programs by
deterministic execution . . . . . . . . 45--63
N. C. Hutchinson and
L. L. Peterson The $x$-Kernel: an architecture for
implementing network protocols . . . . . 64--76
T. K. Sellis and
L. Shapiro Query optimization for nontraditional
database applications . . . . . . . . . 77--86
X. Zhang Performance measurement and modeling to
evaluate various effects on a shared
memory multiprocessor . . . . . . . . . 87--93
G. Florin and
S. Natkin Generalization of queueing network
product form solutions to stochastic
Petri nets . . . . . . . . . . . . . . . 99--107
W. Henderson and
P. G. Taylor Embedded processes in stochastic Petri
nets . . . . . . . . . . . . . . . . . . 108--116
J. Campos and
G. Chiola and
M. Silva Ergodicity and throughput bounds of
Petri nets with unique consistent firing
count vector . . . . . . . . . . . . . . 117--125
I. Hatono and
K. Yamagata and
H. Tamura Modeling and online scheduling of
flexible manufacturing systems using
stochastic Petri nets . . . . . . . . . 126--132
J. Gait Stability, availability, and response in
network file service . . . . . . . . . . 133--140
R. W. Selby and
V. R. Basili Analyzing error-prone system structure 141--152
J. M. Purtilo and
P. Jalote An environment for developing
fault-tolerant software . . . . . . . . 153--159
C. Ghezzi and
D. Mandrioli and
S. Morasca and
M. Pezze A unified high-level Petri net formalism
for time-critical systems . . . . . . . 160--172
T. J. Shimeall and
N. G. Leveson An empirical comparison of software
fault tolerance and fault elimination 173--182
N. H. Minsky The imposition of protocols over open
distributed systems . . . . . . . . . . 183--195
W. S. Humphrey and
N. D. Singpurwalla Predicting (individual) software
productivity . . . . . . . . . . . . . . 196--207
P. Zave An insider's evaluation of PAISLey . . . 212--225
H. B. Reubenstein and
R. C. Waters The Requirements Apprentice: automated
assistance for requirements acquisition 226--240
M. S. Jaffe and
N. G. Leveson and
M. P. E. Heimdahl and
B. E. Melhart Software requirements analysis for
real-time process-control systems . . . 241--258
B. Berthomieu and
M. Diaz Modeling and verification of time
dependent systems using time Petri nets 259--273
F. A. Etessami and
G. S. Hura Rule-based design methodology for
solving control problems . . . . . . . . 274--282
D. E. Perry and
G. E. Kaiser Models of software development
environments . . . . . . . . . . . . . . 283--295
G. Z. Qadah and
L. J. Henschen and
J. J. Kim Efficient algorithms for the
instantiated transitive closure queries 296--309
F. Belli and
P. Jedrzejowicz An approach to the reliability
optimization of software with redundancy 310--312
N. D. Singpurwalla Determining an optimal time interval for
testing and debugging software . . . . . 313--319
W. A. Muhanna Composite programs: hierarchical
construction, circularity, and deadlocks 320--333
K. Kanoun and
M. R. de Bastos Martini and
J. M. de Souza A method for software reliability
analysis and prediction application to
the TROPICO-R switching system . . . . . 334--344
F. Zahedi and
N. Ashrafi Software reliability allocation based on
structure, utility, price, and cost . . 345--356
A. Braccini and
A. Del Bimbo and
E. Vicario Interprocess communication dependency on
network load . . . . . . . . . . . . . . 357--369
J. C. Laprie and
K. Kanoun and
C. Beounes and
M. Kaaniche The KAT
(knowledge--action--transformation)
approach to the modeling and evaluation
of reliability and availability growth 370--382
R. A. DeMillo and
R. J. Lipton Defining software by continuous, smooth
functions . . . . . . . . . . . . . . . 383--384
A. Thomasian and
I. K. Ryu Performance analysis of two-phase
locking . . . . . . . . . . . . . . . . 386--402
E. W. Krauser and
A. P. Mathur and
V. J. Rego High performance software testing on
SIMD machines . . . . . . . . . . . . . 403--423
D. E. Harms and
B. W. Weide Copying and swapping: influences on the
design of reusable software components 424--435
B. Dimitrov and
Z. Khalil and
N. Kolev and
P. Petrov On the optimal total processing time
using checkpoints . . . . . . . . . . . 436--442
D. Ghosal and
G. Serazzi and
S. K. Tripathi The processor working set and its use in
scheduling multiprocessor systems . . . 443--453
M. D. Fraser and
K. Kumar and
V. K. Vaishnavi Informal and formal requirements
specification languages: bridging the
gap . . . . . . . . . . . . . . . . . . 454--466
U. Hahn and
M. Jarke and
T. Rose Teamwork support in a knowledge-based
information systems environment . . . . 467--482
Y. Tohma and
H. Yamano and
M. Ohba and
R. Jacoby The estimation of parameters of the
hypergeometric distribution and its
application to the software reliability
growth model . . . . . . . . . . . . . . 483--489
Y. Dotan and
B. Arazi Using flat concurrent Prolog in system
modeling . . . . . . . . . . . . . . . . 493--512
F. Belli and
K. E. Grosspietsch Specification of fault-tolerant system
issues by predicate/transition nets and
regular expressions --- approach and
case study . . . . . . . . . . . . . . . 513--526
S. Lee and
S. Sluizer An executable language for modeling
simple behavior . . . . . . . . . . . . 527--543
P. C. Chu A contingency approach to estimating
record selectivities . . . . . . . . . . 544--552
R. S. Freedman Testability of software components . . . 553--564
A. Parrish and
S. H. Zweben Analysis and refinement of software test
data adequacy properties . . . . . . . . 565--581
M. van Genuchten Why is software late? An empirical study
of reasons for delay in software
development . . . . . . . . . . . . . . 582--590
S. Fujiwara and
G. v. Bochmann and
F. Khendek and
M. Amalou and
A. Ghedamsi Test selection based on finite state
models . . . . . . . . . . . . . . . . . 591--603
C. Hsu and
M. Bouziane and
L. Rattner and
L. Yee Information resources management in
heterogeneous, distributed environments:
A metadatabase approach . . . . . . . . 604--625
J. R. Callahan and
J. M. Purtilo A packaging system for heterogeneous
execution environments . . . . . . . . . 626--635
J. C. Cherniavsky and
C. H. Smith On Weyuker's axioms for software
complexity measures . . . . . . . . . . 636--638
J. F. Beetem and
A. F. Beetem Incremental scanning and parsing with
galaxy . . . . . . . . . . . . . . . . . 641--651
Z. M. Wojcik and
B. E. Wojcik Rough grammar for efficient and
fault-tolerant computing on a
distributed system . . . . . . . . . . . 652--668
T. Shepard and
J. A. M. Gagne A pre-run-time scheduling algorithm for
hard real-time systems . . . . . . . . . 669--677
W. A. Litwin and
N. Roussopoulos and
G. Levy and
W. Hong Trie Hashing with Controlled Load . . . 678--691
D. E. Eckhardt and
A. K. Caglayan and
J. C. Knight and
L. D. Lee and
D. F. McAllister and
M. A. Vouk and
J. P. J. Kelly An experimental evaluation of software
redundancy as a strategy for improving
reliability . . . . . . . . . . . . . . 692--702
E. J. Weyuker and
B. Jeng Analyzing partition testing strategies 703--711
U. Halici and
A. Dogac An optimistic locking technique for
concurrency control in distributed
databases . . . . . . . . . . . . . . . 712--724
T. Kunz The influence of different workload
descriptions on a heuristic load
balancing scheme . . . . . . . . . . . . 725--730
S. K. Mishra and
V. V. Raghavan and
N. F. Tzeng Efficient algorithms for selection of
recovery points in tree task models . . 731--734
A. D. Stoyenko and
V. C. Hamacher and
R. C. Holt Analyzing hard-real-time programs for
guaranteed schedulability . . . . . . . 737--750
K. B. Gallagher and
J. R. Lyle Using program slicing in software
maintenance . . . . . . . . . . . . . . 751--761
T. Niemi and
K. Jarvelin Prolog-based meta-rules for relational
database representation and manipulation 762--788
A. D. Kshemkalyani and
M. Singhal Invariant-based verification of a
distributed deadlock detection algorithm 789--799
Y. S. Maarek and
D. M. Berry and
G. E. Kaiser An information retrieval approach for
automatically constructing software
libraries . . . . . . . . . . . . . . . 800--813
G. Babin and
F. Lustman and
P. Shoval Specification and design of transactions
in information systems: a formal
approach . . . . . . . . . . . . . . . . 814--829
T. Nakajo and
H. Kume A case history analysis of software
error cause-effect relationships . . . . 830--838
L. M. Taff and
J. W. Borchering and
W. R. Hudgins Estimeetings: development estimates and
a front-end process for a large project 839--849
F. Nishida and
S. Takamatsu and
Y. Fujita and
T. Tani Semi-automatic program construction from
specifications using library modules . . 853--871
D. G. Shin and
K. B. Irani Fragmenting relations horizontally using
a knowledge-based approach . . . . . . . 872--883
A. Coen-Porisini and
F. De Paoli and
C. Ghezzi and
D. Mandrioli Software specialization via symbolic
execution . . . . . . . . . . . . . . . 884--899
R. A. DeMillo and
A. J. Offutt Constraint-based automatic test data
generation . . . . . . . . . . . . . . . 900--910
M. G. Gouda and
T. Herman Adaptive programming . . . . . . . . . . 911--921
C. G. Rommen The probability of load balancing
success in a homogeneous network . . . . 922--933
D. M. Hoffman and
P. Strooper Automated module testing in Prolog . . . 934--943
O. Wolfson and
S. Sengupta and
Y. Yemini Managing communication networks by
monitoring databases . . . . . . . . . . 944--953
Y. Breitbart and
D. Georgakopoulos and
M. Rusinkiewicz and
A. Silberschatz On rigorous transaction scheduling . . . 954--960
S. Cardenas-Garcia and
M. V. Zelkowitz A management tool for evaluation of
software design . . . . . . . . . . . . 961--971
Michael D. Vose A linear algorithm for generating random
numbers with a given distribution . . . 972--975
S. C. Boyd and
H. Ural On the complexity of generating optimal
test sequences . . . . . . . . . . . . . 976--978
G. Graefe Heap-filter merge join: a new algorithm
for joining medium-size inputs . . . . . 979--982
I. Ahmad and
A. Ghafoor Semi-distributed load balancing for
massively parallel multicomputer systems 987--1004
N. Yazia-Pekergin and
J. M. Vincent Stochastic bounds on execution times of
parallel programs . . . . . . . . . . . 1005--1012
A. Gupta and
I. F. Akyildiz and
R. M. Fujimoto Performance analysis of Time Warp with
multiple homogeneous processors . . . . 1013--1027
I. P. Radivojevic and
J. Herath Executing DSP applications in a
fine-grained dataflow environment . . . 1028--1041
R. L. Bagrodia and
C. C. Shen MIDAS: integrated design and simulation
of distributed systems . . . . . . . . . 1042--1058
X. Zhang and
X. Qin Performance prediction and evaluation of
parallel processing on a NUMA
multiprocessor . . . . . . . . . . . . . 1059--1068
J. Sztrik and
D. Kouvatsos Asymptotic analysis of a heterogeneous
multiprocessor system in a randomly
changing environment . . . . . . . . . . 1069--1075
W. W. Chu and
C. M. Sit and
K. K. Leung Task response time for real-time
distributed systems with resource
contentions . . . . . . . . . . . . . . 1076--1092
B. Plateau and
K. Atif Stochastic automata network of modeling
parallel systems . . . . . . . . . . . . 1093--1108
G. M. Karam and
R. J. A. Buhr Temporal logic-based deadlock analysis
for Ada . . . . . . . . . . . . . . . . 1109--1125
K. Miriyala and
M. T. Harandi Automatic derivation of formal software
specifications from informal
descriptions . . . . . . . . . . . . . . 1126--1142
P. A. Karger and
M. E. Zurko and
D. W. Bonin and
A. H. Mason and
C. E. Kahn A retrospective on the VAX VMM security
kernel . . . . . . . . . . . . . . . . . 1147--1165
R. A. Kemmerer and
P. A. Porras Covert flow trees: a visual approach to
analyzing covert storage channels . . . 1166--1185
J. Jacob A uniform presentation of
confidentiality properties . . . . . . . 1186--1194
G. W. Smith Modeling security-relevant data
semantics . . . . . . . . . . . . . . . 1195--1203
G. S. Avrunin and
U. A. Buy and
J. C. Corbett and
L. K. Dillon and
J. C. Wileden Automated analysis of concurrent systems
with the constrained expression toolset 1204--1222
K. W. E. Lor and
D. M. Berry Automatic synthesis of SARA design
models from system requirements . . . . 1229--1240
J. Han and
L. Liu Efficient evaluation of multiple linear
recursions . . . . . . . . . . . . . . . 1241--1252
J. C. S. P. Leite and
P. A. Freeman Requirements validation through
viewpoint resolution . . . . . . . . . . 1253--1269
N. H. Madhavji and
W. Schafer Prism-methodology and process-oriented
environment . . . . . . . . . . . . . . 1270--1283
G. K. Gill and
C. F. Kemerer Cyclomatic complexity density and
software maintenance productivity . . . 1284--1288
K. B. Lakshmanan and
S. Jayaprakash and
P. K. Sinha Properties of control-flow complexity
measures . . . . . . . . . . . . . . . . 1289--1295
M. Satyanarayanan The influence of scale on distributed
file system design . . . . . . . . . . . 1--9
D. Coleman and
F. Hayes and
S. Bear Introducing Objectcharts or how to use
Statecharts in object-oriented design 8--18
E. A. T. Merks and
J. M. Dyck and
R. D. Cameron Language design for program manipulation 19--32
K. W. Miller and
L. J. Morell and
R. E. Noonan and
S. K. Park and
D. M. Nicol and
B. W. Murrill and
M. Voas Estimating the probability of failure
when testing reveals no failures . . . . 33--43
S. D. Carson and
S. Setia Analysis of the periodic update write
policy for disk cache . . . . . . . . . 44--54
M. Granda and
J. M. Drake and
J. A. Gregorio Performance evaluation of parallel
systems by using unbounded generalized
stochastic Petri nets . . . . . . . . . 55--71
V. Grassi and
L. Donatiello and
S. Tucci On the optimal checkpointing of critical
tasks and transaction-oriented systems 72--77
R. Ganesan and
S. Weiss Scalar memory references in pipelined
multiprocessors: a performance study . . 78--86
J. W. Davidson and
A. M. Holler Subprogram inlining: a study of its
effects on program execution time . . . 89--102
C. A. Waldspurger and
T. Hogg and
B. A. Huberman and
J. O. Kephart and
W. S. Stornetta Spawn: a distributed computational
economy . . . . . . . . . . . . . . . . 103--117
P. S. Yu and
D. M. Dias Analysis of hybrid concurrency control
schemes for a high data contention
environment . . . . . . . . . . . . . . 118--129
J. C. Laprie and
K. Kanoun X-ware reliability and availability
modeling . . . . . . . . . . . . . . . . 130--147
H. C. Lin and
C. S. Raghavendra A dynamic load-balancing policy with a
central job dispatcher (LBC) . . . . . . 148--158
G. Pucci A new approach to the modeling of
recovery block structures . . . . . . . 159--167
B. J. Falkowski Comments on an optimal set of indices
for a relational database . . . . . . . 168--171
D. Paulson and
Y. Wand An automated approach to information
systems decomposition . . . . . . . . . 174--189
H. E. Bal and
M. Frans Kaashoek and
Andrew S. Tanenbaum Orca: a language for parallel
programming of distributed systems . . . 190--205
R. N. Taylor and
D. L. Levine and
C. D. Kelly Structural testing of concurrent
programs . . . . . . . . . . . . . . . . 206--215
K. Y. Whang and
A. Malhotra and
G. H. Sockut and
L. Burns and
K. S. Choi Two-dimensional specification of
universal quantification in a graphical
database query language . . . . . . . . 216--224
H. Taylor A lingua franca for concurrent logic
programming . . . . . . . . . . . . . . 225--236
Z. Ammarguellat A control-flow normalization algorithm
and its complexity . . . . . . . . . . . 237--251
Y. E. Papelis and
T. L. Casavant Specification and analysis of
parallel/distributed software and
systems by Petri nets with transition
enabling functions . . . . . . . . . . . 252--261
J. Verner and
G. Tate A software size model . . . . . . . . . 265--278
B. Fields and
M. Elvang-Goransson A VDM case study in mural . . . . . . . 279--295
M. F. Pekergin Parallel computing optimization in the
Apollo Domain network . . . . . . . . . 296--303
G. A. Venkatesh and
C. N. Fischer SPARE: a development environment for
program analysis algorithms . . . . . . 304--318
M. W. Mutka Estimating capacity for sharing in a
privately owned workstation environment 319--328
R. B. France Semantically extended dataflow diagrams:
a formal specification tool . . . . . . 329--346
P. S. Yu and
M. S. Chen and
H. U. Heiss and
S. Lee On workload characterization of
relational database environments . . . . 347--355
E. Steegmans and
J. Lewi and
I. van Horebeek Generation of interactive parsers with
error handling . . . . . . . . . . . . . 357--367
A. P. Sinha and
I. Vessey Cognitive fit: an empirical study of
recursion and iteration . . . . . . . . 368--379
N. H. Madhavji Environment evolution: the Prism model
of changes . . . . . . . . . . . . . . . 380--392
Q. Cui and
J. Gannon Data-oriented exception handling . . . . 393--401
K. C. Kinsley and
C. E. Hughes Analysis of a virtual memory model for
maintaining database views . . . . . . . 402--409
N. F. Schneidewind Methodology for validating software
metrics . . . . . . . . . . . . . . . . 410--422
J. C. Munson and
T. M. Khoshgoftaar The detection of fault-prone programs 423--433
L. Kleinrock and
J. H. Huang On parallel processing systems: Amdahl's
law generalized and some results on
optimal design . . . . . . . . . . . . . 434--447
C. Rich and
Y. A. Feldman Seven layers of knowledge representation
and reasoning in support of software
development . . . . . . . . . . . . . . 451--469
S. Fickas and
B. R. Helm Knowledge representation and reasoning
in the design of composite systems . . . 470--482
J. Mylopoulos and
L. Chung and
B. Nixon Representing and using nonfunctional
requirements: a process-oriented
approach . . . . . . . . . . . . . . . . 483--497
B. Ramesh and
V. Dhar Supporting systems development by
capturing deliberations during
requirements engineering . . . . . . . . 498--510
G. Fischer and
A. Girgensohn and
K. Nakakoji and
D. Redmiles Supporting software designers with
integrated domain-oriented design
environments . . . . . . . . . . . . . . 511--522
D. E. Setliff and
R. A. Rutenbar Knowledge representation and reasoning
in a software synthesis architecture . . 523--533
F. Cacace and
S. Ceri and
L. Tanca and
S. Crespi-Reghizzi Designing and prototyping data-intensive
applications in the Logres and Algres
programming environment . . . . . . . . 534--546
G. L. Heileman and
M. Georgiopoulos and
W. D. Roome A general framework for concurrent
simulation on neural network models . . 551--562
N. Karunanithi and
D. Whitley and
Y. K. Malaiya Prediction of software reliability using
connectionist models . . . . . . . . . . 563--574
E. Mesrobian and
J. Skrzypek A software environment for studying
computational neural systems . . . . . . 575--589
A. Stafylopatis and
A. Likas Pictorial information retrieval using
the random neural network . . . . . . . 590--600
L. S. Smith A framework for neural net specification 601--612
S. T. Kim and
K. Suwunboriruksa and
S. Herath and
A. Jayasumana and
J. Herath Algorithmic transformations for neural
computing and performance of supervised
learning on a dataflow machine . . . . . 613--623
M. Sahinoglu Compound-Poisson software reliability
model . . . . . . . . . . . . . . . . . 624--630
K. Kato and
T. Masuda Persistent Caching: An Implementation
Technique for Complex Objects with
Object Identity . . . . . . . . . . . . 631--645
G. S. Novak and
F. N. Hill and
M. L. Wan and
B. G. Sayrs Negotiated interfaces for software reuse 646--653
J. E. B. Moss Working with persistent objects: to
swizzle or not to swizzle . . . . . . . 657--673
Z. Manna and
R. Waldinger Fundamentals of deductive program
synthesis . . . . . . . . . . . . . . . 674--704
G. Nota and
G. Pacini Querying of executable software
specifications . . . . . . . . . . . . . 705--716
J. M. Voas PIE: a dynamic failure-based technique 717--727
D. Wang and
B. Schurmann Computer aided analysis and derivation
for artificial neural systems . . . . . 728--735
K. Schwan and
H. Zhou Dynamic scheduling of hard real-time
tasks and real-time threads . . . . . . 736--748
R. R. Lutz and
J. S. K. Wong Detecting unsafe error recovery
schedules . . . . . . . . . . . . . . . 749--760
R. Gerber and
I. Lee A layered approach to automating the
verification of real-time systems . . . 768--784
N. Halbwachs and
F. Lagnier and
C. Ratel Programming and verifying real-time
systems by means of the synchronous
data-flow language LUSTRE . . . . . . . 785--793
X. Nicollin and
J. Sifakis and
S. Yovine Compiling real-time specifications into
extended automata . . . . . . . . . . . 794--804
A. C. Shaw Communicating real-time state machines 805--816
B. P. Mahony and
I. J. Hayes A case-study in timed refinement: a mine
pump . . . . . . . . . . . . . . . . . . 817--826
I. Greif and
A. Seliger and
W. Weihl A case study of CES: a distributed
collaborative editing system implemented
in Argus . . . . . . . . . . . . . . . . 827--839
L. Mark and
R. J. Cochrane Grammars and relations . . . . . . . . . 840--849
W. L. Johnson and
M. S. Feather and
D. R. Harris Representation and presentation of
requirements knowledge . . . . . . . . . 853--869
W. Mark and
S. Tyler and
J. McGuire and
J. Schlossberg Commitment-based software development 870--885
M. Oivo and
V. R. Basili Representing software engineering
models: the TAME goal oriented approach 886--898
B. Ciciani and
D. M. Dias and
P. S. Yu Analysis of concurrency-coherency
control protocols for distributed
transaction processing systems with
regional locality . . . . . . . . . . . 899--914
T. Mukhopadhyay and
S. Kekre Software effort models for early
estimation of process control
applications . . . . . . . . . . . . . . 915--924
L. C. Briand and
V. R. Basili and
W. M. Thomas A pattern recognition approach for
software engineering data analysis . . . 931--942
R. Chillarege and
I. S. Bhandari and
J. K. Chaar and
M. J. Halliday and
D. S. Moebus and
B. K. Ray and
M. Y. Wong Orthogonal defect classification --- a
concept for in-process measurements . . 943--956
S. C. Eick and
J. L. Steffen and
E. E. Sumner Seesoft --- a tool for visualizing line
oriented software statistics . . . . . . 957--968
Y. Liao and
D. Cohen A specificational approach to high level
program monitoring and measuring . . . . 969--978
T. M. Khoshgoftaar and
J. C. Munson and
B. B. Bhattacharya and
G. D. Richardson Predictive modeling techniques of
software quality from software measures 979--987
W. W. Agresti and
W. M. Evanco Projecting software defects from
analyzing Ada designs . . . . . . . . . 988--997
M. K. Daskalantonakis A practical view of software measurement
and implementation experiences within
Motorola . . . . . . . . . . . . . . . . 998--1010
C. F. Kemerer and
B. S. Porter Improving the reliability of function
point measurement: an empirical study 1011--1024
W. Harrison An entropy-based measure of software
complexity . . . . . . . . . . . . . . . 1025--1029
C. Ebert Correspondence visualization techniques
for analyzing and evaluating software
measures . . . . . . . . . . . . . . . . 1029--1034
V. Rajlich Guest Editor's introduction: special
issue on software maintenance . . . . . 1037--1037
N. Wilde and
R. Huitt Maintenance support for object-oriented
programs . . . . . . . . . . . . . . . . 1038--1044
M. Lejter and
S. Meyers and
S. P. Reiss Support for maintaining object-oriented
programs . . . . . . . . . . . . . . . . 1045--1052
G. Canfora and
A. Cimitile and
U. de Carlini A logic-based approach to reverse
engineering tools production . . . . . . 1053--1064
W. Kozaczynski and
J. Ning and
A. Engberts Program concept recognition and
transformation . . . . . . . . . . . . . 1065--1075
J. J. P. Tsai and
T. Weigert and
H. C. Jang A hybrid knowledge representation as a
basis of requirement specification and
specification analysis . . . . . . . . . 1076--1100
R. W. Butler and
G. B. Finelli The infeasibility of quantifying the
reliability of life-critical real-time
software . . . . . . . . . . . . . . . . 3--12
J. M. Rushby and
F. von Henke Formal verification of algorithms for
critical systems . . . . . . . . . . . . 13--23
J. M. Atlee and
J. Gannon State-based model checking of
event-driven system requirements . . . . 24--40
A. P. Ravn and
H. Rischel and
K. M. Hansen Specifying and verifying requirements of
real-time systems . . . . . . . . . . . 41--55
R. Kurki-Suonio Stepwise design of real-time systems . . 56--69
J. Xu and
D. L. Parnas On satisfying timing constraints in
hard-real-time systems . . . . . . . . . 70--84
G. Chiola and
M. A. Marsan and
G. Balbo and
G. Conte Generalized stochastic Petri nets: a
definition at the net level and its
implications . . . . . . . . . . . . . . 89--107
Y. Huang and
S. K. Tripathi Resource allocation for primary-site
fault-tolerant systems . . . . . . . . . 108--119
A. Delis and
N. Roussopoulos Performance comparison of three modern
DBMS architectures . . . . . . . . . . . 120--138
J. Xu Multiprocessor scheduling of processes
with release times, deadlines,
precedence, and exclusion relations . . 139--154
K. L. Wu and
W. K. Fuchs Rapid transaction-undo recovery using
twin-page storage management . . . . . . 155--164
G. Richter and
B. Maffeo Toward a rigorous interpretation of
ESML-extended systems modeling language 165--180
P. V. Rangan Trust requirements and performance of a
fast subtransport-level protocol for
secure communication . . . . . . . . . . 181--186
A. K. Agrawala and
B. N. Jain Deterministic model and transient
analysis of virtual circuits . . . . . . 187--197
M. Young and
D. L. Levine and
R. N. Taylor Comments on ``Temporal logic-based
deadlock analysis for Ada'' by G. M.
Karam and R. J. A. Burh . . . . . . . . 198--199
M. K. Daskalantonakis Correction to ``A practical view of
software measurement and implementation
experiences within Motorola'' . . . . . 199--200
P. G. Frankl and
E. J. Weyuker A formal analysis of the fault-detecting
ability of testing methods . . . . . . . 202--213
E. R. Gansner and
E. Koutsofios and
S. C. North and
K. P. Vo A technique for drawing directed graphs 214--230
J. Micallef and
G. E. Kaiser Support algorithms for incremental
attribute evaluation of asynchronous
subtree replacements . . . . . . . . . . 231--252
D. T. Peng and
K. G. Shin Optimal scheduling of cooperative tasks
in a distributed system using an
enumerative method . . . . . . . . . . . 253--267
J. Plaice and
W. W. Wadge A new approach to version control . . . 268--276
G. C. Roma and
R. F. Gamble and
W. E. Ball Formal derivation of rule-based programs 277--296
J. P. Ukelson and
J. D. Gould and
S. J. Boies User navigation in computer applications 297--306
N. Y. Foo Comments on ``Defining software by
continuous smooth functions'' by R. A.
De Millo and R. J. Lipton . . . . . . . 307--309
J. Xu and
D. L. Parnas Correction to `On satisfying timing
constraints in hard-real-time systems'
by J. Xu and D. L. Parnas . . . . . . . 310
K. J. Lieberherr and
C. Xiao Object-oriented software evolution . . . 313--343
C. Batini and
G. Di Battista and
G. Santucci Structuring primitives for a dictionary
of entity relationship data schemas . . 344--365
T. Camp and
P. Kearns and
M. Ahuja Proof rules for flush channels . . . . . 366--378
R. D. Banker and
R. J. Kauffman and
D. Zweig Repository evaluation of software reuse 379--389
M. Y. M. Yen and
R. W. Scamell A human factors experimental comparison
of SQL and QBE . . . . . . . . . . . . . 390--409
L. Ness L.0: a truly concurrent executable
temporal logic language for protocols 410--423
T. Miyoshi and
M. Azuma An empirical study of evaluating
software development environment quality 425--435
V. Berzins and
Luqi and
A. Yehudai Using transformations in
specification-based prototyping . . . . 436--452
B. Kramer and
Luqi and
V. Berzins Compositional semantics of a real-time
prototyping language . . . . . . . . . . 453--477
R. E. Strom and
D. M. Yellin Extending typestate checking using
conditional liveness analysis . . . . . 478--485
G. Iazeolla and
F. Marinuzzi LISPACK --- a methodology and tool for
the performance analysis of parallel
systems and algorithms . . . . . . . . . 486--502
M. G. Staskauskas Formal derivation of concurrent
programs: an example from industry . . . 503--528
D. R. Jeffery and
G. C. Low and
M. Barnes A comparison of function point counting
techniques . . . . . . . . . . . . . . . 529--532
D. J. Richardson and
M. C. Thompson An analysis of test data selection
criteria using the RELAY model of fault
detection . . . . . . . . . . . . . . . 533--553
E. V. Sorensen and
J. Nordahl and
N. H. Hansen From CSP models to Markov models . . . . 554--570
P. Ramanathan and
K. G. Shin Use of common time base for
checkpointing and rollback recovery in a
distributed system . . . . . . . . . . . 571--583
M. J. Harrold and
B. Malloy A unified interprocedural program
representation for a maintenance
environment . . . . . . . . . . . . . . 584--593
N. R. Adam and
R. Tewari Regeneration with virtual copies for
distributed computing systems . . . . . 594--602
T. K. Abdel-Hamid and
K. Sengupta and
D. Ronan Software project control: an
experimental investigation of judgment
with fallible information . . . . . . . 603--612
H. C. Rao and
L. L. Peterson Accessing files in an Internet: the Jade
file system . . . . . . . . . . . . . . 613--624
A. Kay and
J. N. Reed A rely and guarantee method for timed
CSP: a specification and design of a
telephone exchange . . . . . . . . . . . 625--639
G. Canfora and
A. Cimitile and
U. de Carlini Correction to ``A logic-based approach
to reverse engineering tools production
(Dec 92 1053--1064) . . . . . . . . . . 640
M. R. Girgis Corrigendum for ``Constraint-based
automatic test data generation'' by R.
A. DeMillo and A. J. Offutt . . . . . . 640
F. Grandi and
M. R. Scalas Block access estimation for clustered
data using a finite LRU buffer . . . . . 641--660
R. Rask and
P. Laamanen and
K. Lyyttinen Simulation and comparison of Albrecht's
function point and DeMarco's function
bang metrics in a CASE environment . . . 661--671
J. Biswas and
J. C. Browne Data structures for parallel resource
management . . . . . . . . . . . . . . . 672--686
M. Z. Tsoukalas and
J. W. Duran and
S. C. Ntafos On some reliability estimation problems
in random and partition testing . . . . 687--697
S. Rangarajan and
P. Jalote and
S. K. Tripathi Capacity of voting systems . . . . . . . 698--706
A. Sears Layout appropriateness: a metric for
evaluating user interface widget layout 707--719
C. U. Smith and
L. G. Williams Software performance engineering: a case
study including performance comparison
with design alternatives . . . . . . . . 720--741
A. S. Parrish and
S. H. Zweben Clarifying some fundamental concepts in
software testing . . . . . . . . . . . . 742--746
G. Graefe and
D. L. Davison Encapsulation of parallelism and
architecture-independence in extensible
database query execution . . . . . . . . 749--764
T. Nakajo and
I. Azuma and
M. Tada A case history development of a
foolproofing interface documentation
system . . . . . . . . . . . . . . . . . 765--773
P. G. Frankl and
S. N. Weiss An experimental comparison of the
effectiveness of branch testing and data
flow testing . . . . . . . . . . . . . . 774--787
B. Hamidzadeh and
S. Shekhar Specification and analysis of real-time
problem solvers . . . . . . . . . . . . 788--803
W. W. Chu and
I. T. Ieong A transaction-based approach to vertical
partitioning for relational database
systems . . . . . . . . . . . . . . . . 804--812
J. L. Hellerstein Achieving service rate objectives with
decay usage scheduling . . . . . . . . . 813--825
R. Govindarajan Exception handlers in functional
programming languages . . . . . . . . . 826--834
P. Di Felice Reusability of mathematical software: a
contribution . . . . . . . . . . . . . . 835--843
M. Ahuja and
T. Carlson and
A. Gahlot Passive-space and time view: vector
clocks for achieving higher performance,
program correction, and distributed
computing . . . . . . . . . . . . . . . 845--855
D. L. Parnas Predicate logic for software engineering 856--862
A. M. K. Cheng and
J. C. Browne and
A. K. Mok and
Rwo-Hsi Wang Analysis of real-time rule-based systems
with behavioral constraint assertions
specified in Estella . . . . . . . . . . 863--885
P. Helman and
G. Liepins Statistical foundations of audit trail
analysis for the detection of computer
misuse . . . . . . . . . . . . . . . . . 886--901
Ing-Ray Chen and
S. A. Banawan Modeling and analysis of concurrent
maintenance policies for data structures
using pointers . . . . . . . . . . . . . 902--911
E. J. Weyuker More experience with data flow testing 912--919
D. I. Katcher and
H. Arakawa and
J. K. Strosnider Engineering and analysis of fixed
priority schedulers . . . . . . . . . . 920--934
J. J. Shilling Incremental LL(1) parsing in
language-based editors . . . . . . . . . 935--940
J. A. Solheim and
J. H. Rowland An empirical study of testing and
integration strategies using artificial
software systems . . . . . . . . . . . . 941--949
L. F. Cabrera and
J. A. McPherson and
P. M. Schwarz and
J. C. Wyllie Implementing atomicity in two systems:
techniques, tradeoffs, and experience 950--961
P. G. Frankl and
E. J. Weyuker Provable improvements on branch testing 962--975
Bin Qin Meet real-time requirements of parallel
programs and maximally utilize system
resources . . . . . . . . . . . . . . . 976--981
P. S. Yu and
D. M. Dias Performance analysis of concurrency
control using locking with deferred
blocking . . . . . . . . . . . . . . . . 982--996
A. Del Bimbo and
M. Campanai and
P. Nesi A three-dimensional iconic environment
for image database querying . . . . . . 997--1011
A. Arora and
M. Gouda Closure and convergence: a foundation of
fault-tolerant computing . . . . . . . . 1015--1027
L. C. Briand and
V. R. Brasili and
C. J. Hetmanski Developing interpretable models with
optimized set reduction for identifying
high-risk software components . . . . . 1028--1044
S. A. Vander Wiel and
L. G. Votta Assessing software designs using
capture-recapture methods . . . . . . . 1045--1054
J. K. Chaar and
M. J. Halliday and
I. S. Bhandari and
R. Chillarege In-process evaluation for software
inspection and test . . . . . . . . . . 1055--1070
L. A. Tomek and
J. K. Muppala and
K. S. Trivedi Modeling correlation in software
recovery blocks . . . . . . . . . . . . 1071--1086
Y. K. Malaiya and
A. von Mayrhauser and
P. K. Srimani An examination of fault exposure ratio 1087--1094
N. F. Schneidewind Software reliability model with optimal
selection of failure data . . . . . . . 1095--1104
W. I. Kao and
R. K. Iyer and
D. Tang FINE: A fault injection and monitoring
environment for tracing the UNIX system
behavior under faults . . . . . . . . . 1105--1118
O. Berman and
N. Ashrafi Optimization models for reliability of
modular software systems . . . . . . . . 1119--1123
S. C. Bandinelli and
A. Fuggetta and
C. Ghezzi Software process model evolution in the
SPADE environment . . . . . . . . . . . 1128--1144
M. L. Jaccheri and
R. Conradi Techniques for process model evolution
in EPOS . . . . . . . . . . . . . . . . 1145--1156
I. Bhandari and
M. Halliday and
E. Tarver and
D. Brown and
J. Chaar and
R. Chillarege A case study of software process
improvement during development . . . . . 1157--1170
Wei Kuan Shih and
J. W. S. Liu and
C. L. Liu Modified rate-monotonic algorithm for
scheduling periodic jobs with deferred
deadlines . . . . . . . . . . . . . . . 1171--1179
P. B. Danzig Flow control for limited buffer
multicast . . . . . . . . . . . . . . . 1--12
M. G. Harbour and
M. H. Klein and
J. P. Lehoczky Timing analysis for fixed-priority
scheduling of hard real-time systems . . 13--28
T. Higashino and
G. v. Bochmann Automatic analysis and test case
derivation for a restricted class of
LOTOS expressions with data parameters 29--42
A. D. Kshemkalyani and
M. Singhal Efficient detection and resolution of
generalized distributed deadlocks . . . 43--54
S. S. Lam and
A. U. Shankar A theory of interfaces and modules
$I$-composition theorem . . . . . . . . 55--71
G. Luo and
A. Das and
G. v. Bochmann Software testing based on SDL
specifications with save . . . . . . . . 72--87
M. D. Rice and
S. B. Seidman A formal model for module
interconnection languages . . . . . . . 88--101
Jong-Deok Choi and
R. Cytron and
J. Ferrante On the efficient engineering of
ambitious program analysis . . . . . . . 105--114
Jianan Li and
I. Suzuki and
M. Yamashita A new structural induction theorem for
rings of temporal Petri nets . . . . . . 115--126
M. Felder and
D. Mandrioli and
A. Morzenti Proving properties of real-time systems
through logical specifications and Petri
net models . . . . . . . . . . . . . . . 127--141
P. E. Ammann and
S. S. Brilliant and
J. C. Knight The effect of imperfect error detection
on reliability assessment via life
testing . . . . . . . . . . . . . . . . 142--148
Gang Luo and
G. von Bochmann and
A. Petrenko Test selection based on communicating
nondeterministic finite-state machines
using a generalized Wp-method . . . . . 149--162
R. D. Banker and
R. J. Kauffman and
C. Wright and
D. Zweig Automating output size and reuse metrics
in a repository-based computer-aided
software engineering (CASE) environment 169--187
Yen-Min Huang and
C. V. Ravishankar Designing an agent synthesis system for
cross-RPC communication . . . . . . . . 188--198
N. Fenton Software measurement: a necessary
scientific basis . . . . . . . . . . . . 199--206
F. Lustman Specifying transaction-based information
systems with regular expressions . . . . 207--217
W. G. Griswold Comments on ``Language design for
program manipulation'' . . . . . . . . . 218--219
R. L. Bagrodia and
Wen-Toh Liao Maisie: a language for the design of
efficient discrete-event simulations . . 225--238
G. C. Roman and
C. D. Wilcox Architecture-directed refinement . . . . 239--258
S. Antoy and
J. Gannon Using term rewriting to verify software 259--274
J. E. Matson and
B. E. Barrett and
J. M. Mellichamp Software development cost estimation
using function points . . . . . . . . . 275--287
G. W. Ernst and
R. J. Hookway and
W. F. Ogden Modular verification of data
abstractions with shared realizations 288--307
S. Vestal Fixed-priority sensitivity analysis for
linear compute time models . . . . . . . 308--317
S. R. Dalal and
A. A. McIntosh When to stop testing for large software
systems with changing code . . . . . . . 318--323
M. Notomi and
T. Murata Hierarchical reachability graph of
bounded Petri nets for
concurrent-software analysis . . . . . . 325--336
A. J. Offutt and
S. D. Lee An empirical evaluation of weak mutation 337--344
N. Lopez-Benitez Dependability modeling and analysis of
distributed programs . . . . . . . . . . 345--352
E. Weyuker and
T. Goradia and
A. Singh Automatically generating test data from
a Boolean specification . . . . . . . . 353--363
Xiping Song and
L. J. Osterweil Experience with an approach to comparing
software design methodologies . . . . . 364--384
H. D. Pande and
W. A. Landi and
B. G. Ryder Interprocedural def-use associations for
C systems with single level pointers . . 385--403
V. Akella and
G. Gopalakrishnan Specification and validation of
control-intensive IC's in hopCP . . . . 405--423
N. R. Saxena and
E. J. McCluskey Linear complexity assertions for sorting 424--431
P. Krueger and
N. G. Shivaratri Adaptive location policies for global
scheduling . . . . . . . . . . . . . . . 432--444
W. E. Howden and
B. Wieand QDA --- a method for systematic informal
program analysis . . . . . . . . . . . . 445--462
S. Paul and
A. Prakash A framework for source code search using
program patterns . . . . . . . . . . . . 463--475
S. R. Chidamber and
C. F. Kemerer A metrics suite for object oriented
design . . . . . . . . . . . . . . . . . 476--493
C. Wohlin and
P. Runeson Certification of software components . . 494--499
M. Flatebo and
A. K. Datta Two-state self-stabilizing algorithms
for token rings . . . . . . . . . . . . 500--504
G. Ciardo and
R. German and
C. Lindemann A characterization of the stochastic
process underlying a stochastic Petri
net . . . . . . . . . . . . . . . . . . 506--515
G. Franceschinis and
R. R. Muntz Computing bounds for the performance
indices of quasi-lumpable stochastic
well-formed nets . . . . . . . . . . . . 516--525
J. Campos and
J. M. Colom and
H. Jungnitz and
M. Silva Approximate throughput computation of
stochastic marked graphs . . . . . . . . 526--535
R. J. Boucherie A characterization of independence for
competing Markov chains with
applications to stochastic Petri nets 536--544
A. Coen-Porisini and
R. A. Kemmerer and
D. Mandrioli A formal framework for ASTRAL intralevel
proof obligations . . . . . . . . . . . 548--561
D. W. Bustard and
A. C. Winstanley Making changes to formal specifications:
requirements and an example . . . . . . 562--568
A. C. W. Finkelstein and
D. Gabbay and
A. Hunter and
J. Kramer and
B. Nuseibeh Inconsistency handling in
multiperspective specifications . . . . 569--578
Shing Chi Cheung and
J. Kramer Tractable dataflow analysis for
distributed systems . . . . . . . . . . 579--593
A. Aue and
M. Breu Distributed information systems: an
advanced methodology . . . . . . . . . . 594--605
F. De Paoli and
F. Tisato CSDL: a language for cooperative systems
design . . . . . . . . . . . . . . . . . 606--616
W. B. Frakes and
T. P. Pole An empirical study of representation
methods for reusable software components 617--630
B. W. Weide and
S. H. Edwards and
D. E. Harms and
D. A. Lamb Design and specification of iterators
using the swapping paradigm . . . . . . 631--643
J. M. Bieman and
L. M. Ott Measuring functional cohesion . . . . . 644--657
Ing-Ray Chen and
F. B. Bastani Warm standby in hierarchically
structured process-control programs . . 658--663
S. Stoller Addendum to ``Proof rules for flush
channels'' . . . . . . . . . . . . . . . 664
S. Weerahandi and
R. E. Hausman Software quality measurement based on
fault-detection data . . . . . . . . . . 665--676
S. Campodonico and
N. D. Singpurwalla A Bayesian analysis of the
logarithmic--Poisson execution time
model based on expert opinion and
failure data . . . . . . . . . . . . . . 677--683
N. G. Leveson and
M. P. E. Heimdahl and
H. Hildreth and
J. D. Reese Requirements specification for
process-control systems . . . . . . . . 684--707
G. S. Avrunin and
J. C. Corbett and
L. K. Dillon and
J. C. Wileden Automated derivation of time bounds in
uniprocessor concurrent systems . . . . 708--719
M. Tucci and
G. Vitiello and
G. Costagliola Parsing nonlinear languages . . . . . . 720--739
K. Kanoun and
J. C. Laprie Software reliability trend analyses from
theoretical to practical considerations 740--747
Yabo Wang and
D. L. Parnas Simulating the behavior of software
modules by trace rewriting . . . . . . . 750--759
B. Nuseibeh and
J. Kramer and
A. Finkelstein A framework for expressing the
relationships between multiple views in
requirements specification . . . . . . . 760--773
M. G. Bradac and
D. E. Perry and
L. G. Votta Prototyping a process monitoring
experiment . . . . . . . . . . . . . . . 774--784
L. Hatton and
A. Roberts How accurate is scientific software? . . 785--797
D. L. Kiskis and
K. G. Shin SWSL: a synthetic workload specification
language for real-time systems . . . . . 798--811
J. A. Whittaker and
M. G. Thomason A Markov chain model for statistical
software testing . . . . . . . . . . . . 812--824
H. Lichter and
M. Schneider-Hufschmidt and
H. Zullighoven Prototyping in industrial software
projects-bridging the gap between theory
and practice . . . . . . . . . . . . . . 825--832
H. Wohlwend and
S. Rosenbaum Schlumberger's software improvement
program . . . . . . . . . . . . . . . . 833--839
H. H. Deubler and
M. Koestler Introducing object orientation into
large and complex systems . . . . . . . 840--848
S. Honiden and
K. Nishimura and
N. Uchihira and
K. Itoh An application of artificial
intelligence to object-oriented
performance design for real-time systems 849--867
D. A. Menasce and
Y. Yesha and
K. Kalpakis On a unified framework for the
evaluation of distributed quorum
attainment protocols . . . . . . . . . . 868--884
A. Bertolino and
M. Marre Automatic generation of path covers
based on the control flow analysis of
computer programs . . . . . . . . . . . 885--899
M. Diaz and
G. Juanole and
J. P. Courtiat Observer --- a concept for formal
on-line validation of distributed
systems . . . . . . . . . . . . . . . . 900--913
Ying Liu and
A. K. Singh and
R. L. Bagrodia A decompositional approach to the design
of parallel programs . . . . . . . . . . 914--932
F. Jahanian and
A. K. Mok Modechart: a specification language for
real-time systems . . . . . . . . . . . 933--947
D. Lorge Parnas and
J. Madey and
M. Iglewski Precise documentation of well-structured
programs . . . . . . . . . . . . . . . . 948--976
T. Y. Chen and
Y. T. Yu On the relationship between partition
and random testing . . . . . . . . . . . 977--980
P. Triantafillou and
D. J. Taylor The location-based paradigm for
replication: Achieving efficiency and
availability in distributed systems . . 1--18
D. S. Rosenblum A practical approach to programming with
assertions . . . . . . . . . . . . . . . 19--31
J. J. P. Tsai and
S. Jennhwa Yang and
Yao-Hsiung Chang Timing constraint Petri nets and their
application to schedulability analysis
of real-time system specifications . . . 32--49
S. Hariri and
H. Mutlu Hierarchical modeling of availability in
distributed systems . . . . . . . . . . 50--56
A. Boswell Specification and validation of a
security policy model . . . . . . . . . 63--68
G. Barrett Model checking in practice: the T9000
virtual channel processor . . . . . . . 69--78
J. Bicarregui and
B. Ritchie Invariants, frames and postconditions: a
comparison of the VDM and B notations 79--89
D. Craigen and
S. Gerhart and
T. Ralston Formal methods reality check: industrial
usage . . . . . . . . . . . . . . . . . 90--98
J. Jacky Specifying a safety-critical control
system in Z . . . . . . . . . . . . . . 99--106
S. Owre and
J. Rushby and
N. Shankar and
F. von Henke Formal verification for fault-tolerant
architectures: prolegomena to the design
of PVS . . . . . . . . . . . . . . . . . 107--125
K. Srinivasan and
D. Fisher Machine learning approaches to
estimating software development effort 126--137
K. Osterbye Literate Smalltalk programming using
hypertext . . . . . . . . . . . . . . . 138--145
R. G. Dromey A model for software product quality . . 146--162
S. Venkatesan and
B. Dathan Testing and debugging distributed
programs using global predicates . . . . 163--177
K. Ilgun and
R. A. Kemmerer and
P. A. Porras State transition analysis: a rule-based
intrusion detection approach . . . . . . 181--199
S. H. Zweben and
S. H. Edwards and
B. W. Weide and
J. E. Hollingsworth The effects of layering and
encapsulation on software development
cost and quality . . . . . . . . . . . . 200--208
T. Johnson Approximate analysis of reader/writer
queues . . . . . . . . . . . . . . . . . 209--218
W. J. Gutjahr Optimal test distributions for software
failure cost estimation . . . . . . . . 219--228
D. D. Cowan and
C. J. P. Lucena Abstract data views: an interface
specification concept to enhance design
for reuse . . . . . . . . . . . . . . . 229--243
S. Vranes and
M. Stanojevic Integrating multiple paradigms within
the blackboard framework . . . . . . . . 244--262
N. I. Churcher and
M. J. Shepperd and
S. Chidamber and
C. F. Kemerer Comments on ``A metrics suite for object
oriented design'' . . . . . . . . . . . 263--265
W. G. Griswold and
D. Notkin Architectural tradeoffs for a
meaning-preserving program restructuring
tool . . . . . . . . . . . . . . . . . . 275--287
B. Hayes-Roth and
K. Pfleger and
P. Lalanda and
P. Morignot and
M. Balabanovic A domain-specific software architecture
for adaptive intelligent systems . . . . 288--301
T. R. Dean and
J. R. Cordy A syntactic theory of software
architecture . . . . . . . . . . . . . . 302--313
Mary Shaw and
Robert DeLine and
Daniel V. Klein and
Theodore L. Ross and
David M. Young and
Gregory Zelesnik Abstractions for software architecture
and tools to support them . . . . . . . 314--335
D. C. Luckham and
J. J. Kenney and
L. M. Augustin and
J. Vera and
D. Bryan and
W. Mann Specification and analysis of system
architecture using Rapide . . . . . . . 336--354
M. Moriconi and
X. Qian and
R. A. Riemenschneider Correct architecture refinement . . . . 356--372
P. Inverardi and
A. L. Wolf Formal specification and analysis of
software architectures using the
chemical abstract machine model . . . . 373--386
R. Gerber and
Seongsoo Hong Compiling real-time programs with timing
constraint refinement and structural
code motion . . . . . . . . . . . . . . 389--404
J. Tian and
Peng Lu and
J. Palma Test-execution-based reliability
measurement and modeling for large
commercial software . . . . . . . . . . 405--414
F. Ng and
G. Butler and
Judy Kay An intelligent tutoring system for the
Dijkstra--Gries methodology . . . . . . 415--428
S. Dolev and
A. Israeli and
S. Moran Analyzing expected time by
scheduler-luck games . . . . . . . . . . 429--439
S. Bandinelli and
A. Fuggetta and
L. Lavazza and
M. Loi and
G. P. Picco Modeling and improving an industrial
software process . . . . . . . . . . . . 440--454
Inhwan Lee and
R. K. Iyer Software dependability in the Tandem
GUARDIAN system . . . . . . . . . . . . 455--467
M. G. Sriram and
M. Singhal Measures of the potential for load
sharing in distributed computing systems 468--475
A. Burns and
K. Tindell and
A. Wellings Effective analysis for engineering
real-time fixed priority schedulers . . 475--480
R. J. Hall Call path refinement profiles . . . . . 481--496
M. Spezialetti and
R. Gupta Loop monotonic statements . . . . . . . 497--505
A. M. Stavely Verifying definite iteration over data
structures . . . . . . . . . . . . . . . 506--514
T. Kunz and
J. P. Black Using automatic process clustering for
design recovery and distributed
debugging . . . . . . . . . . . . . . . 515--527
H. Mili and
F. Mili and
A. Mili Reusing software: issues and research
directions . . . . . . . . . . . . . . . 528--562
A. A. Porter and
L. G. Votta and
V. R. Basili Comparing detection methods for software
requirements inspections: a replicated
experiment . . . . . . . . . . . . . . . 563--575
R. Gerber and
Seongsoo Hong and
M. Saksena Guaranteeing real-time requirements with
resource-based calibration of periodic
processes . . . . . . . . . . . . . . . 579--592
Sung-Soo Lim and
Young Hyun Bae and
Gyu Tae Jang and
Byung-Do Rhee and
Sang Lyul Min and
Chang Yun Park and
Heonshik Shin and
Kunsoo Park and
Soo-Mook Moon and
Chong Sang Kim An accurate worst case timing analysis
for RISC processors . . . . . . . . . . 593--604
Rwo-Hsi Wang and
A. K. Mok Response-time bounds of EQL rule-based
programs under rule priority structure 605--614
R. H. Saavedra and
A. J. Smith Performance characterization of
optimizing compilers . . . . . . . . . . 615--628
A. M. Tyrrell and
G. F. Carpenter CSP methods for identifying atomic
actions in the design of fault tolerant
concurrent systems . . . . . . . . . . . 629--639
J. Tian and
M. V. Zelkowitz Complexity measure evaluation and
selection . . . . . . . . . . . . . . . 641--650
G. S. Novak Conversion of units of measurement . . . 651--661
P. Bertolazzi and
G. Di Battista and
G. Liotta Parametric graph drawing . . . . . . . . 662--673
M. Jorgensen Experience with the accuracy of software
maintenance task effort prediction
models . . . . . . . . . . . . . . . . . 674--681
H. Levy and
R. J. T. Morris Exact analysis of Bernoulli
superposition of streams into a least
recently used cache . . . . . . . . . . 682--688
J. A. Rolia and
K. C. Sevcik The Method of Layers . . . . . . . . . . 689--700
H. Sarper No special schemes are needed for
solving software reliability
optimization models . . . . . . . . . . 701--702
A. Avritzer and
E. R. Weyuker The automatic generation of load test
suites and the assessment of the
resulting software . . . . . . . . . . . 705--716
D. C. Luckham and
J. Vera An event-based architecture definition
language . . . . . . . . . . . . . . . . 717--734
K. J. Goldman and
B. Swaminathan and
P. McCartney and
M. D. Anderson and
R. Sethuraman The Programmers' Playground: I/O
abstraction for user-configurable
distributed applications . . . . . . . . 735--746
J. H. R. May and
A. D. Lunn A model of code sharing for estimating
software failure on demand probabilities 747--753
C. M. Woodside A three-view model for performance
engineering of concurrent software . . . 754--767
L. Lamport TLA in pictures . . . . . . . . . . . . 768--775
J. E. Neilson and
C. M. Woodside and
D. C. Petriu and
S. Majumdar Software bottlenecking in client-server
systems and rendezvous networks . . . . 776--782
A. Borgida and
J. Mylopoulos and
R. Reiter On the frame problem in procedure
specifications . . . . . . . . . . . . . 785--798
R. H. Bourdeau and
B. H. C. Cheng A formal semantics for object model
diagrams . . . . . . . . . . . . . . . . 799--821
M. Aagaard and
M. Leeser Verifying a logic-synthesis algorithm
and implementation: a case study in
software verification . . . . . . . . . 822--833
V. B. Lortz and
K. G. Shin Semaphore queue priority assignment for
real-time multiprocessor synchronization 834--844
B. Krishnamurthy and
D. S. Rosenblum Yeast: a general purpose event-action
system . . . . . . . . . . . . . . . . . 845--857
R. A. DeMillo and
A. P. Mathur and
W. E. Wong and
P. G. Frankl and
E. J. Weyuker Some critical remarks on a hierarchy of
fault-detecting abilities of test
methods [and reply] . . . . . . . . . . 858--863
S. Cavalieri and
A. Di Stefano and
O. Mirabella Pre-run-time scheduling to reduce
schedule length in the FieldBus
environment . . . . . . . . . . . . . . 865--880
A. H. Lee and
J. L. Zachary Reflections on metaprogramming . . . . . 883--893
D. A. Ladd and
J. C. Ramming A*: a language for implementing language
processors . . . . . . . . . . . . . . . 894--901
K. Yasumatsu and
N. Doi SPiCE: a system for translating
Smalltalk programs into a C environment 902--912
Yong-Fong Lee and
B. G. Ryder and
M. E. Fiuczynski Region analysis: a parallel elimination
method for data flow analysis . . . . . 913--926
Anonymous 1995 Index \booktitleIEEE Transactions
on Software Engineering Vol. 21 . . . . 1
B. Kitchenham and
S. Lawrence Pfleeger and
N. Fenton Towards a framework for software
measurement validation . . . . . . . . . 929--944
J. Tian Integrating time domain and input domain
analyses of software reliability using
tree-based models . . . . . . . . . . . 945--958
Jia Liang Han Program partition and logic program
analysis . . . . . . . . . . . . . . . . 959--968
G. Bucci and
E. Vicario Compositional validation of
time-critical systems using
communicating time Petri nets . . . . . 969--992
G. S. Novak Creation of views for reuse of software
with different data representations . . 993--1005
A. S. Parrish and
S. H. Zweben On the relationships among the all-uses,
all-DU-paths, and all-edges testing
criteria . . . . . . . . . . . . . . . . 1006--1009
P. Devanbu On ``A framework for source code search
using program patterns'' . . . . . . . . 1009--1010
J. McHugh Introduction to the Special Section . . 3
M. Abadi and
R. Needham Prudent engineering practice for
cryptographic protocols . . . . . . . . 6--15
N. Heintze and
J. D. Tygar A model for secure protocols and their
compositions . . . . . . . . . . . . . . 16--30
M. K. Reiter A secure group membership protocol . . . 31--42
Li Gong and
Xiaolei Qian Computational issues in secure
interoperation . . . . . . . . . . . . . 43--52
J. McLean A general theory of composition for a
class of ``possibilistic'' properties 53--67
L. C. Briand and
S. Morasca and
V. R. Basili Property-based software engineering
measurement . . . . . . . . . . . . . . 68--86
A. Bertolino and
L. Strigini On the use of testability measures for
dependability assessment . . . . . . . . 97--108
T. Y. Chen and
Y. T. Yu On the expected number of failures
detected by subdomain testing and random
testing . . . . . . . . . . . . . . . . 109--119
D. Gupta and
P. Jalote and
G. Barua A formal framework for on-line software
version change . . . . . . . . . . . . . 120--131
C. Clemencon and
B. Mukherjee and
K. Schwan Distributed shared abstractions (DSA) on
multiprocessors . . . . . . . . . . . . 132--152
V. Rajlich and
J. H. Silva Evolution and reuse of orthogonal
architecture . . . . . . . . . . . . . . 153--157
K. Finney Mathematical notation in formal
specification: too difficult for the
masses? . . . . . . . . . . . . . . . . 158--159
J. C. Corbett Evaluating deadlock detection methods
for concurrent software . . . . . . . . 161--180
R. Alur and
T. A. Henzinger and
Pei-Hsin Ho Automatic symbolic verification of
embedded systems . . . . . . . . . . . . 181--201
S. Paul and
A. Prakash A query algebra for program databases 202--217
Sanping Chen and
S. Mills A binary Markov process model for random
testing . . . . . . . . . . . . . . . . 218--223
C. D. Wilcox and
G. C. Roman Reasoning about places, times, and
actions in the presence of mobility . . 225--247
Hong Zhu A formal analysis of the subsume
relation between software test adequacy
criteria . . . . . . . . . . . . . . . . 248--255
F. Boussinot and
R. de Simone The SL synchronous language . . . . . . 256--266
M. Hitz and
B. Montazeri Chidamber and Kemerer's metrics suite: a
measurement theory perspective . . . . . 267--271
Lin Lin Wang Thorough investigation into ``An
improved algorithm based on subset
closures for synthesizing a relational
database scheme'' . . . . . . . . . . . 271--274
W. B. Frakes and
C. J. Fox Quality improvement using a software
reuse failure modes model . . . . . . . 274--279
C. Meadows Guest Editorial: Introduction to the
Special Section . . . . . . . . . . . . 281
O. Sibert and
P. A. Porras and
R. Lindell An analysis of the Intel 80x86 security
architecture and implementations . . . . 283--293
R. J. Anderson and
S. J. Bezuidenhoudt On the reliability of electronic payment
systems . . . . . . . . . . . . . . . . 294--301
M. K. Franklin and
M. K. Reiter The design and implementation of a
secure auction service . . . . . . . . . 302--312
R. Kailar Accountability in electronic commerce
protocols . . . . . . . . . . . . . . . 313--328
M. H. Kang and
I. S. Moskowitz and
D. C. Lee A network pump . . . . . . . . . . . . . 329--338
S. K. Abd-El-Hafiz and
V. R. Basili A knowledge-based approach to the
analysis of loops . . . . . . . . . . . 339--360
D. Notkin and
D. R. Jeffery Guest Editorial: Introduction to the
Special Section . . . . . . . . . . . . 361
M. P. E. Heimdahl and
N. G. Leveson Completeness and consistency in
hierarchical state-based requirements 363--377
M. A. Ardis and
J. A. Chaves and
L. J. Jagadeesan and
P. Mataga and
C. Puchol and
M. G. Staskauskas and
J. Von Olnhausen A framework for evaluating specification
methods for reactive systems-experience
report . . . . . . . . . . . . . . . . . 378--389
R. N. Taylor and
N. Medvidovic and
K. M. Anderson and
E. J. Whitehead and
J. E. Robbins and
K. A. Nies and
P. Oreizy and
D. L. Dubrow A component- and message-based
architectural style for GUI software . . 390--406
T. Isakowitz and
R. J. Kauffman Supporting search for reusable software
objects . . . . . . . . . . . . . . . . 407--423
A. Von Mayrhauser and
A. M. Vans Identification of dynamic comprehension
processes during large scale maintenance 424--437
M. J. Harrold and
G. Rothermel Separate computation of alias
information for reuse . . . . . . . . . 442--460
J. C. Corbett Timing analysis of Ada tasking programs 461--483
D. Jackson and
C. A. Damon Elements of style: analyzing a software
design feature with a counterexample
detector . . . . . . . . . . . . . . . . 484--495
P. Godefroid and
D. Peled and
M. Staskauskas Using partial-order methods in the
formal validation of industrial
concurrent programs . . . . . . . . . . 496--507
P. Zave and
M. Jackson Where do operations come from? A
multiparadigm specification technique 508--528
G. Rothermel and
M. J. Harrold Analyzing regression test selection
techniques . . . . . . . . . . . . . . . 529--551
Kuo-Chung Tai Theory of fault-based predicate testing
for computer programs . . . . . . . . . 552--562
K. J. Sullivan and
I. J. Kalet and
D. Notkin Evaluating the mediator method: Prism as
a case study . . . . . . . . . . . . . . 563--579
Taizan Chan and
Siu Leung Chung and
Teck Hua Ho An economic model to estimate software
rewriting and replacement times . . . . 580--598
Anonymous Reference Model for Smooth Growth of
Software Systems (003)5402022 . . . . .
G. Ciardo and
C. Ghezzi Guest Editorial: Introduction to the
Special Section . . . . . . . . . . . . 601
M. A. Qureshi and
W. H. Sanders and
A. P. A. van Moorsel and
R. German Algorithms for the generation of
state-level representations of
stochastic activity networks with
general reward structures . . . . . . . 603--614
P. Kemper Numerical analysis of superposed GSPNs 615--628
R. Gaeta Efficient discrete-event simulation of
colored Petri nets . . . . . . . . . . . 629--639
V. Mainkar and
K. S. Trivedi Sufficient conditions for existence of a
fixed point in stochastic reward
net-based iterative models . . . . . . . 640--653
M. Sereno Approximate mean value analysis for
stochastic marked graphs . . . . . . . . 654--664
M. Ward Derivation of data intensive algorithms
by formal transformation: the
Schnorr--Waite graph marking algorithm 665--686
T. Adams Total variance approach to software
reliability estimation . . . . . . . . . 687--688
E. Battiston and
F. De Cindio and
G. Mauri Modular algebraic nets to specify
concurrent systems . . . . . . . . . . . 689--705
K. D. Maxwell and
L. Van Wassenhove and
S. Dutta Software development productivity of
European space, military, and industrial
applications . . . . . . . . . . . . . . 706--718
N. J. Puketza and
K. Zhang and
M. Chung and
B. Mukherjee and
R. A. Olsson A methodology for testing intrusion
detection systems . . . . . . . . . . . 719--729
F. Ferrucci and
G. Tortora and
M. Tucci and
G. Vitiello Semantics-based inference algorithms for
adaptive visual environments . . . . . . 730--750
V. R. Basili and
L. C. Briand and
W. L. Melo A validation of object-oriented design
metrics as quality indicators . . . . . 751--761
F. W. Burton Guaranteeing good memory bounds for
parallel programs . . . . . . . . . . . 762--773
P. Stocks and
D. Carrington A framework for specification-based
testing . . . . . . . . . . . . . . . . 777--793
M. B. Dwyer and
L. A. Clarke A compact Petri net representation and
its implications for analysis . . . . . 794--811
P. Triantafillou Independent recovery in large-scale
distributed systems . . . . . . . . . . 812--826
H. Levy and
T. G. Messinger and
R. J. T. Morris The cache assignment problem and its
application to database buffer
management . . . . . . . . . . . . . . . 827--838
S. Bandinelli and
E. Di Nitto and
A. Fuggetta Supporting cooperation in the SPADE-1
environment . . . . . . . . . . . . . . 841--865
Y. Chernak A statistical approach to the inspection
checklist formal synthesis and
improvement . . . . . . . . . . . . . . 866--874
J. D. Blackburn and
G. D. Scudder and
L. N. Van Wassenhove Improving speed and productivity of
software development: a global survey of
software developers . . . . . . . . . . 875--885
N. Ohlsson and
H. Alberg Predicting fault-prone software modules
in telephone switches . . . . . . . . . 886--894
A. Abran and
P. N. Robillard Function points analysis: an empirical
study of its measurement processes . . . 895--910
R. H. Bourdeau and
B. H. C. Cheng Correspondence: Response to Botting's
Comments . . . . . . . . . . . . . . . . 911--911
R. J. Botting and
R. H. Bourdeau and
B. H. C. Cheng Comments on ``A formal semantics for
object model diagrams'' . . . . . . . . 911
Anonymous 1996 Index \booktitleIEEE Transactions
on Software vol. 22 . . . . . . . . . . 912--919
Yong Yan and
Xiaodong Zhang and
Qian Ma Software support for multiprocessor
latency measurement and evaluation . . . 4--16
B. Korel Computation of dynamic program slices
for unstructured programs . . . . . . . 17--34
P. Triantafillou and
C. Neilson Achieving strong consistency in a
distributed file system . . . . . . . . 35--55
R. J. Hilderman and
H. J. Hamilton A note on regeneration with virtual
copies . . . . . . . . . . . . . . . . . 56--59
Anonymous Author index . . . . . . . . . . . . . . 60--61
Anonymous Guest Editorial: Introduction to the
Special Section . . . . . . . . . . . . 65--66
D. Batory and
B. J. Geraci Composition validation and subjectivity
in GenVoca generators . . . . . . . . . 67--82
S. H. Edwards Representation inheritance: a safe form
of ``White box'' code inheritance . . . 83--92
Wu-Chun Feng and
J. W. S. Liu Algorithms for scheduling real-time
tasks with input error and end-to-end
deadlines . . . . . . . . . . . . . . . 93--106
A. Wellings and
A. Burns Implementing atomic actions in Ada 95 107--123
A. A. Porter and
P. M. Johnson Assessing software review meetings:
results of a comparative analysis of two
experimental studies . . . . . . . . . . 129--145
D. S. Rosenblum and
E. J. Weyuker Using coverage information to predict
the cost-effectiveness of regression
testing strategies . . . . . . . . . . . 146--156
M. Sitaraman and
B. W. Weide and
W. F. Ogden On the practical need for abstraction
relations to verify abstract data type
representations . . . . . . . . . . . . 157--170
Jen-Yen Jason Chen CSPL: an Ada95-like, Unix-based process
environment . . . . . . . . . . . . . . 171--184
M. Abadi Explicit communication revisited: two
new attacks on authentication protocols 185--186
S. Morasca and
L. C. Briand and
V. R. Basili and
E. J. Weyuker and
M. V. Zelkowitz and
B. Kitchenham and
S. Lawrence Pfleeger and
N. Fenton Comments on ``Towards a framework for
software measurement validation'' . . . 187--189
B. Kitchenham and
S. Lawrence Pfleeger and
N. Fenton Reply To: Comments On ``Towards a
Framework of Software Measurement
Validation'' . . . . . . . . . . . . . . 189--189
G. Poels and
G. Dedene and
L. C. Briand and
S. Morasca and
V. R. Basili Comments on ``Property-based software
engineering measurement: refining the
additivity properties'' . . . . . . . . 190--197
L. C. Briand and
S. Morasca and
V. R. Basili Response To: Comments On
``Property-based Software Engineering
Measurement: Refining The Additivity
Properties'' . . . . . . . . . . . . . . 196--197
S. R. Faulk and
C. Heitmeyer Introduction to the Special Section . . 201--202
M. Kaufmann and
J. S. Moore An industrial strength theorem prover
for a logic based on Common Lisp . . . . 203--213
W. D. Young Comparing verification systems:
interactive consistency in ACL2 . . . . 214--223
B. Bloom and
A. Cheng and
A. Dsouza Using a Protean language to enhance
expressiveness in specification . . . . 224--234
E. Jonsson and
T. Olovsson A quantitative model of the security
intrusion process based on attacker
behavior . . . . . . . . . . . . . . . . 235--245
F. Lanubile and
G. Visaggio Extracting reusable functions by flow
graph based program slicing . . . . . . 246--259
B. Henderson-Sellers Corrigenda: ``Software size estimation
of object-oriented systems'' . . . . . . 260--261
L. K. Dillon and
S. Sankar Introduction to the special issue . . . 265--266
B. Dutertre and
V. Stavridou Formal requirements analysis of an
avionics control system . . . . . . . . 267--278
G. J. Holzmann The model checker SPIN . . . . . . . . . 279--295
S. Matsuura and
H. Kuruma and
S. Honiden EVA: a flexible programming method for
evolving systems . . . . . . . . . . . . 296--313
Changqing Wang and
D. R. Musser Dynamic verification of C++ generic
algorithms . . . . . . . . . . . . . . . 314--323
A. A. Porter and
H. P. Siy and
C. A. Toman and
L. G. Votta An experiment to assess the
cost-benefits of code inspections in
large scale software development . . . . 329--346
B. A. Myers and
R. G. McDaniel and
R. C. Miller and
A. S. Ferrency and
A. Faulring and
B. D. Kyle and
A. Mickish and
A. Klimovitski and
P. Doane The Amulet environment: new models for
effective user interface software
development . . . . . . . . . . . . . . 347--365
A. Mukherjee and
D. P. Siewiorek Measuring software dependability by
robustness benchmarking . . . . . . . . 366--378
Qing Hu Evaluating alternative software
production functions . . . . . . . . . . 379--387
I. Ripoll and
A. Crespo and
A. Garcia-Fornes An optimal algorithm for scheduling soft
aperiodic tasks in dynamic-priority
preemptive systems . . . . . . . . . . . 388--400
G. S. Novak Software reuse by specialization of
generic procedures through views . . . . 401--417
A. Sen The role of opportunism in the software
design reuse process . . . . . . . . . . 418--436
D. M. Cohen and
S. R. Dalal and
M. L. Fredman and
G. C. Patton The AETG system: an approach to testing
based on combinatorial design . . . . . 437--444
R. Mili and
A. Mili and
R. T. Mittermeir Storing and retrieving software
components: a refinement based system 445--460
L. J. Holtzblatt and
R. L. Piazza and
H. B. Reubenstein and
S. N. Roberts and
D. R. Harris Design recovery for distributed systems 461--472
M. J. Gallagher and
V. Lakshmi Narasimhan ADTEST: a test data generation suite for
Ada software systems . . . . . . . . . . 473--484
K. Pillai and
V. S. Sukumaran Nair A model for software development effort
and cost estimation . . . . . . . . . . 485--497
D. Binkley Semantics guided regression test cost
reduction . . . . . . . . . . . . . . . 498--516
M. Y. Wu and
W. Shu On parallelization of static scheduling
algorithms . . . . . . . . . . . . . . . 517--528
N. B. Ebrahimi On the statistical analysis of the
number of errors remaining in a software
design document after inspection . . . . 529--532
H. Zuse Reply to: ``Property-based software
engineering measurement'' . . . . . . . 533
Nam-Yong Lee and
C. R. Litecky An empirical study of software reuse
with special attention to Ada . . . . . 537--549
R. Focardi and
R. Gorrieri The Compositional Security Checker: a
tool for the verification of information
flow security properties . . . . . . . . 550--571
A. Coen-Porisini and
C. Ghezzi and
R. A. Kemmerer Specification of realtime systems using
ASTRAL . . . . . . . . . . . . . . . . . 572--598
T. F. Abdelzaher and
K. G. Shin Comment on ``A pre-run-time scheduling
algorithm for hard real-time systems'' 599--600
Anonymous Real-time Systems Symposium (RTSS'96) 0:1--0:1
Sang H. Son Guest Editorial: Introduction to the
Special Section . . . . . . . . . . . . 601--602
J. Sun and
M. K. Gardner and
J. W. S. Liu Bounding completion times of jobs with
arbitrary release times, variable
execution times and resource sharing . . 603--615
A. Mehra and
A. Indiresan and
K. G. Shin Structuring communication software for
quality-of-service guarantees . . . . . 616--634
A. K. Mok and
D. Chen A multiframe model for real-time tasks 635--645
K. Audenaert Clock trees: logical clocks for programs
with nested parallelism . . . . . . . . 646--658
G. Lowe and
B. Roscoe Using CSP to detect errors in the TMN
protocol . . . . . . . . . . . . . . . . 659--669
B. Littlewood and
D. Wright Some conservative stopping rules for the
operational testing of safety critical
software . . . . . . . . . . . . . . . . 673--683
C. J. Walter and
P. Lincoln and
N. Suri Formally verified on-line diagnosis . . 684--721
R. Mahajan and
B. Shneiderman Visual and textual consistency checking
tools for graphical user interfaces . . 722--735
M. Shepperd and
C. Schofield Estimating software project effort using
analogies . . . . . . . . . . . . . . . 736--743
Dar-Tzen Peng and
K. G. Shin and
T. F. Abdelzaher Assignment and scheduling communicating
periodic tasks in distributed real-time
systems . . . . . . . . . . . . . . . . 745--758
D. B. Stewart and
R. A. Volpe and
P. K. Khosla Design of dynamically reconfigurable
real-time software using port-based
objects . . . . . . . . . . . . . . . . 759--776
G. Costagliola and
A. De Lucia and
S. Orefice and
G. Tortora A parsing methodology for the
implementation of visual systems . . . . 777--799
Anonymous 1997 Index \booktitleIEEE Transactions
on Software Vol. 23 . . . . . . . . . . 800--807
S. Easterbrook and
R. Lutz and
R. Covington and
J. Kelly and
Y. Ampo and
D. Hamilton Experiences using lightweight formal
methods for requirements modeling . . . 4--14
M. Neil and
G. Ostrolenk and
M. Tobin and
M. Southworth Lessons from using Z to specify a
software tool . . . . . . . . . . . . . 15--23
Shaoying Liu and
A. J. Offutt and
C. Ho-Stuart and
Y. Sun and
M. Ohba SOFL: a formal engineering methodology
for industrial applications . . . . . . 24--45
B. Chetali Formal verification of concurrent
programs using the Larch prover . . . . 46--62
A. Arora and
S. S. Kulkarni Component based design of multitolerant
systems . . . . . . . . . . . . . . . . 63--78
L. M. Seiter and
J. Palsberg and
K. J. Lieberherr Evolution of object behavior using
context relations . . . . . . . . . . . 79--92
Anonymous Author index . . . . . . . . . . . . . . 93--95
P. J. McCann and
G. C. Roman Compositional programming abstractions
for mobile computing . . . . . . . . . . 97--110
J. M. Bieman and
Byung-Kyoo Kang Measuring design-level cohesion . . . . 111--124
J. Carreira and
H. Madeira and
J. G. Silva Xception: a technique for the
experimental evaluation of dependability
in modern computers . . . . . . . . . . 125--136
A. L. Lederer and
J. Prasad A causal model for software cost
estimating error . . . . . . . . . . . . 137--148
L. Alvisi and
K. Marzullo Message logging: pessimistic,
optimistic, causal, and optimal . . . . 149--159
D. K. Peters and
D. L. Parnas Using test oracles generated from
program documentation . . . . . . . . . 161--173
A. Sutcliffe and
N. Maiden The domain theory for requirements
engineering . . . . . . . . . . . . . . 174--196
S. Jarzabek Design of flexible static program
analyzers with PQL . . . . . . . . . . . 197--215
A. Sowmya and
S. Ramesh Extending statecharts with temporal
logic . . . . . . . . . . . . . . . . . 216--231
M. Snoeck and
G. Dedene Existence dependency: The key to
semantic integrity between structural
and behavioral aspects of object types 233--251
Y. M. Huang and
C. V. Ravishankar Constructive protocol specification
using Cicero . . . . . . . . . . . . . . 252--267
S. McLellan and
A. Roesler and
Z. Fei and
S. Chandran and
C. Spinuzzi Experience using Web-based shotgun
measures for large-system
characterization and improvement . . . . 268--277
B. Kitchenham A procedure for analyzing unbalanced
datasets . . . . . . . . . . . . . . . . 278--301
L. Prechelt and
W. F. Tichy A controlled experiment to assess the
benefits of procedure argument type
checking . . . . . . . . . . . . . . . . 302--312
Anonymous Special Issue --- Mobility and
Network-Aware Computing . . . . . . . . 0:1--0:1
G. C. Roman and
C. Ghezzi Introduction to the special issue . . . 313--314
R. De Nicola and
G. L. Ferrari and
R. Pugliese KLAIM: a kernel language for agents
interaction and mobility . . . . . . . . 315--330
M. Wermelinger and
J. L. Fiadeiro Connectors for mobile programs . . . . . 331--341
A. Fuggetta and
G. P. Picco and
G. Vigna Understanding code mobility . . . . . . 342--361
P. Ciancarini and
R. Tolksdorf and
F. Vitali and
D. Rossi and
A. Knoche Coordinating multiagent applications on
the WWW: a reference architecture . . . 362--375
J. Bolliger and
T. Gross A framework based approach to the
development of network aware
applications . . . . . . . . . . . . . . 376--390
S. Liu and
A. J. Offutt and
C. Ho-Stuart Correction to ``SOFL: A formal
engineering methodology for industrial
applications'' . . . . . . . . . . . . . 390--390
G. Welling and
B. R. Badrinath An architecture for exporting
environment awareness to mobile
computing applications . . . . . . . . . 391--400
G. Rothermel and
M. J. Harrold Empirical studies of a safe regression
test selection technique . . . . . . . . 401--419
M. E. Helander and
Ming Zhao and
N. Ohlsson Planning models for software reliability
and cost . . . . . . . . . . . . . . . . 420--434
A. Arora and
S. S. Kulkarni Designing masking fault-tolerance via
nonmasking fault-tolerance . . . . . . . 435--450
A. Waheed and
D. T. Rover and
J. K. Hollingsworth Modeling and evaluating design
alternatives for an on-line
instrumentation system: a case study . . 451--470
R. H. Carver and
Kuo-Chung Tai Use of sequencing constraints for
specification-based testing of
concurrent programs . . . . . . . . . . 471--490
R. Harrison and
S. J. Counsell and
R. V. Nithi An evaluation of the MOOD set of
object-oriented software metrics . . . . 491--496
D. Garlan Guest Editorial. Introduction to the
Special Section . . . . . . . . . . . . 497--497
W. Chan and
R. J. Anderson and
P. Beame and
S. Burns and
F. Modugno and
D. Notkin and
J. D. Reese Model checking large software
specifications . . . . . . . . . . . . . 498--520
D. Le Metayer Describing software architecture styles
using graph grammars . . . . . . . . . . 521--533
W. G. Griswold and
M. I. Chen and
R. W. Bowdidge and
J. L. Cabaniss and
V. B. Nguyen and
J. D. Morgenthaler Tool support for planning the
restructuring of data abstractions in
large systems . . . . . . . . . . . . . 534--558
C. B. Seaman and
V. R. Basili Communication and organization: an
empirical study of discussion in
inspection meetings . . . . . . . . . . 559--572
K. M. Hansen and
A. P. Ravn and
V. Stavridou From safety analysis to software
requirements . . . . . . . . . . . . . . 573--584
A. Fuggetta and
R. N. Taylor Introduction to the Special Section . . 585--585
P. G. Frankl and
R. G. Hamlet and
B. Littlewood and
L. Strigini Evaluating testing methods by delivered
reliability [software] . . . . . . . . . 586--601
G. S. Avrunin and
J. C. Corbett and
L. K. Dillon Analyzing partially-implemented
real-time systems . . . . . . . . . . . 602--614
A. H. Dutoit and
B. Bruegge Communication metrics for software
development . . . . . . . . . . . . . . 615--628
S. R. Chidamber and
D. P. Darcy and
C. F. Kemerer Managerial use of metrics for
object-oriented software: an exploratory
analysis . . . . . . . . . . . . . . . . 629--639
T. L. Roberts and
M. L. Gibson and
K. T. Fields and
R. K. Rainer Factors that impact implementing a
system development methodology . . . . . 640--649
J. E. Cook and
L. G. Votta and
A. L. Wolf Cost-effective analysis of in-place
software processes . . . . . . . . . . . 650--663
M. Hurfin and
M. Mizuno and
M. Raynal and
M. Singhal Efficient distributed detection of
conjunctions of local predicates . . . . 664--677
M. Jazayeri Guest Editorial: Introduction to the
Special Section . . . . . . . . . . . . 681--681
Yih-Fam Chen and
E. R. Gansner and
E. Koutsofios A C++ data model supporting reachability
analysis and dead code detection . . . . 682--694
J. Desharnais and
M. Frappier and
R. Khedri and
A. Mili Integration of sequential scenarios . . 695--708
J. Rushby and
S. Owre and
N. Shankar Subtypes for specifications: predicate
subtyping in PVS . . . . . . . . . . . . 709--720
G. Canfora and
A. Cimitile and
U. De Carlini and
A. De Lucia An extensible system for source code
analysis . . . . . . . . . . . . . . . . 721--740
S. Schneider Verifying authentication protocols in
CSP . . . . . . . . . . . . . . . . . . 741--758
Xiping Song and
L. J. Osterweil Engineering software design processes to
guide process execution . . . . . . . . 759--775
Yow-Jian Lin and
M. Jazayeri Managing Feature Interactions
Telecommunications Software Systems ---
Guest Editorial . . . . . . . . . . . . 777--778
D. O. Keck and
P. J. Kuehn The feature and service interaction
problem in telecommunications systems: a
survey . . . . . . . . . . . . . . . . . 779--796
F. J. Lin and
Hong Liu and
A. Ghosh A methodology for feature interaction
detection in the AIN 0.1 framework . . . 797--817
S. Tsang and
E. H. Magill Learning to detect and avoid run-time
feature interactions in intelligent
networks . . . . . . . . . . . . . . . . 818--830
M. Jackson and
P. Zave Distributed feature composition: a
virtual architecture for
telecommunications services . . . . . . 831--847
S. Bhansali and
T. J. Hoar Automated software synthesis: an
application in mechanical CAD . . . . . 848--862
A. Lecerof and
F. Paterno Automatic support for usability
evaluation . . . . . . . . . . . . . . . 863--888
D. D. Deavours and
W. H. Sanders ``On-the-fly'' solution techniques for
stochastic Petri nets and extensions . . 889--902
A. van Lamsweerde and
R. Darimont and
E. Letier Managing conflicts in goal-driven
requirements engineering . . . . . . . . 908--926
C. Heitmeyer and
J. Kirby and
B. Labaw and
M. Archer and
R. Bharadwaj Using abstraction and model checking to
detect safety violations in requirements
specifications . . . . . . . . . . . . . 927--948
M. S. Feather Rapid application of lightweight formal
methods for consistency analyses . . . . 949--959
J. Grundy and
J. Hosking and
W. B. Mugridge Inconsistency management for
multiple-view software development
environments . . . . . . . . . . . . . . 960--981
G. Cugola Tolerating deviations in process support
systems via flexible enactment of
process models . . . . . . . . . . . . . 982--1001
N. E. Fenton and
M. Neil A strategy for improving safety related
software engineering standards . . . . . 1002--1013
Zhen Liu Performance analysis of stochastic timed
Petri nets using linear programming
approach . . . . . . . . . . . . . . . . 1014--1030
M. Jarke and
R. Kurki-Suonio Introduction to the special issue . . . 1033--1035
P. Haumer and
K. Pohl and
K. Weidenhaupt Requirements elicitation and validation
with real world scenes . . . . . . . . . 1036--1054
C. Rolland and
C. Souveyet and
C. B. Achour Guiding goal modeling using scenarios 1055--1071
A. G. Sutcliffe and
N. A. M. Maiden and
S. Minocha and
D. Manuel Supporting scenario-based requirements
engineering . . . . . . . . . . . . . . 1072--1088
A. van Lamsweerde and
L. Willemet Inferring declarative requirements
specifications from operational
scenarios . . . . . . . . . . . . . . . 1089--1114
Woo Jin Lee and
Sung Deok Cha and
Yong Rae Kwon Integration and analysis of use cases
using modular Petri nets in requirements
engineering . . . . . . . . . . . . . . 1115--1130
R. J. A. Buhr Use case maps as architectural entities
for complex systems . . . . . . . . . . 1131--1155
J. M. Carroll and
M. B. Rosson and
G. Chin and
J. Koenemann Requirements development in
scenario-based design . . . . . . . . . 1156--1170
O. Stiemerling and
A. B. Cremers The use of cooperation scenarios in the
design and evaluation of a CSCW system 1171--1181
W. Dzida and
R. Freitag Making use of scenarios for validating
analysis and design . . . . . . . . . . 1182--1196
C. T. Karamanolis and
J. N. Magee Client-access protocols for replicated
services . . . . . . . . . . . . . . . . 3--21
G. C. Buttazzo and
M. Caccamo Minimizing aperiodic response times in a
firm real-time environment . . . . . . . 22--32
F. Borges Paulo and
P. C. Masiero and
M. C. Ferreira de Oliveira Hypercharts: extended statecharts to
support hypermedia specification . . . . 33--49
A. D. Stoyen and
T. J. Marlowe and
M. F. Younis and
P. V. Petrov A development environment for complex
distributed real-time applications . . . 50--74
R. K. Joshi and
D. J. Ram Anonymous remote computing: a paradigm
for parallel programming on
interconnected workstations . . . . . . 75--90
L. C. Briand and
J. W. Daly and
J. K. Wust A unified framework for coupling
measurement in object-oriented systems 91--121
C. E. Hrischuk and
C. Murray Woodside and
J. A. Rolia Trace-based load characterization for
generating performance software models 122--135
N. B. Ebrahimi How to improve the calibration of cost
models . . . . . . . . . . . . . . . . . 136--140
Anonymous 1998 reviewer list . . . . . . . . . . . 141--144
G. Chiola and
W. H. Sanders Guest Editorial: Introduction to the
Special Section . . . . . . . . . . . . 145--146
J. Campos and
S. Donatelli and
M. Silva Structured solution of asynchronously
communicating stochastic modules . . . . 147--165
P. Buchholz Hierarchical structuring of superposed
GSPNs . . . . . . . . . . . . . . . . . 166--181
P. Kemper Transient analysis of superposed GSPNs 182--193
A. Heindl and
R. German A fourth-order algorithm with automatic
stepsize control for the transient
analysis of DSPNs . . . . . . . . . . . 194--206
G. Ciardo and
D. M. Nicol and
K. S. Trivedi Discrete-event simulation of fluid
stochastic Petri nets . . . . . . . . . 207--217
P. J. Haas Estimation methods for nonregenerative
stochastic Petri nets . . . . . . . . . 218--236
A. Ferscha Adaptive time warp simulation of timed
Petri nets . . . . . . . . . . . . . . . 237--257
Kentaro Go and
N. Shiratori A decomposition of a formal
specification: an improved
constraint-oriented method . . . . . . . 258--273
J. M. Helary and
R. H. B. Netzer and
M. Raynal Consistency issues in distributed
checkpoints . . . . . . . . . . . . . . 274--281
L. Pickard and
B. Kitchenham and
P. Jones and
Qing Hu Comments on: ``Evaluating alternative
software production functions'' . . . . 282--285
P. Franki and
D. Hamlet and
B. Littlewood and
L. Strigini Call for papers . . . . . . . . . . . . 286--286
J. C. Ramming and
D. S. Wile Guest editorial --- introduction to the
special section . . . . . . . . . . . . 289--290
C. Elliott An embedded modeling language approach
to interactive 3D and multimedia
animation . . . . . . . . . . . . . . . 291--308
L. Cardelli and
R. Davies Service combinators for Web computing 309--316
S. Chandra and
B. Richards and
J. R. Larus Teapot: a domain-specific language for
writing cache coherence protocols . . . 317--333
D. L. Atkins and
T. Ball and
G. Bruns and
K. Cox Mawl: a domain-specific language for
form-based services . . . . . . . . . . 334--346
F. Bertrand and
M. Augeraud BDL: a specialized language for
per-object reactive control . . . . . . 347--362
S. A. Thibault and
R. Marlet and
C. Consel Domain-specific languages: from design
to implementation application to video
device drivers generation . . . . . . . 363--377
N. Klarlund and
M. I. Schwartzbach A domain-specific language for regular
sets of strings and trees . . . . . . . 378--386
D. R. Engler Interface compilation: steps toward
compiling program interfaces as
languages . . . . . . . . . . . . . . . 387--400
T. A. Varvarigou and
M. E. Anagnostou and
S. R. Ahuja Reconfiguration models and algorithms
for stateful interactive processes . . . 401--415
P. Caspi and
A. Girault and
D. Pilaud Automatic distribution of reactive
systems for asynchronous networks of
processors . . . . . . . . . . . . . . . 416--427
S. D. Lang An extended banker's algorithm for
deadlock avoidance . . . . . . . . . . . 428--432
D. R. Jeffery and
L. G. Votta Empirical Software Engineering . . . . . 435--437
G. C. Murphy and
R. J. Walker and
E. L. A. Banlassad Evaluating emerging software development
technologies: lessons learned from
assessing aspect-oriented programming 438--455
V. R. Basili and
F. Shull and
F. Lanubile Building knowledge through families of
experiments . . . . . . . . . . . . . . 456--473
K. Torii and
K. Matsumoto and
K. Nakakoji and
Y. Takada and
S. Takada and
K. Shima Ginger2: an environment for
computer-aided empirical software
engineering . . . . . . . . . . . . . . 474--492
C. F. Kemerer and
S. Slaughter An empirical approach to studying
software evolution . . . . . . . . . . . 493--509
I. Myrtveit and
E. Stensrud A controlled experiment to assess the
benefits of estimating with analogy and
regression models . . . . . . . . . . . 510--525
A. von Mayrhauser and
S. Lang A coding scheme to support systematic
analysis of software comprehension . . . 526--540
R. Agarwal and
P. De and
A. P. Sinha Comprehending object and process models:
an empirical study . . . . . . . . . . . 541--556
C. B. Seaman Qualitative methods in empirical studies
of software engineering . . . . . . . . 557--572
S. Chulani and
B. Boehm and
B. Steece Bayesian analysis of empirical software
engineering cost models . . . . . . . . 573--583
K. J. Sullivan and
M. Marchukov and
J. Socha Analysis of a conflict between
aggregation and interface negotiation in
Microsoft's Component Object Model . . . 584--599
C. Fetzer and
F. Cristian A highly available local leader election
service . . . . . . . . . . . . . . . . 603--618
Z. Kalbarczyk and
R. K. Iyer and
G. L. Ries and
J. U. Patel and
M. S. Lee and
Y. Xiao Hierarchical simulation approach to
accurate fault modeling for system
dependability evaluation . . . . . . . . 619--632
R. Ortalo and
Y. Deswarte and
M. Kaaniche Experimenting with quantitative
evaluation tools for monitoring
operational security . . . . . . . . . . 633--650
J. Rushby Systematic formal verification for
fault-tolerant time-triggered algorithms 651--660
W. J. Gutjahr Partition testing vs. random testing:
the influence of uncertainty . . . . . . 661--674
N. E. Fenton and
M. Neil A critique of software defect prediction
models . . . . . . . . . . . . . . . . . 675--689
I. R. Chen and
S. A. Banawan Performance and stability analysis of
multilevel data structures with deferred
reorganization . . . . . . . . . . . . . 690--700
M. F. Younis and
T. J. Marlowe and
A. D. Stoyen and
G. Tsai Statically safe speculative execution
for real-time systems . . . . . . . . . 701--721
L. C. Briand and
S. Morasca and
V. R. Basili Defining and validating measures for
object-based high-level design . . . . . 722--743
M. J. Harrold and
H. A. Muller Guest editorial: introduction to the
special section . . . . . . . . . . . . 747--748
M. Siff and
T. Reps Identifying modules via concept analysis 749--768
N. F. Schneidewind Measuring and evaluating maintenance
process using reliability, risk, and
test metrics . . . . . . . . . . . . . . 769--781
C. Ghezzi and
B. Nuseibeh Guest editorial: introduction to the
special section . . . . . . . . . . . . 782--783
I. Sommerville and
P. Sawyer and
S. Viller Managing process inconsistency using
viewpoints . . . . . . . . . . . . . . . 784--799
M. S. Krishnan and
M. I. Kellner Measuring process consistency:
implications for reducing software
defects . . . . . . . . . . . . . . . . 800--815
W. N. Robinson and
S. D. Pawlowski Managing requirements inconsistency with
development goal monitors . . . . . . . 816--835
W. Emmerich and
A. Finkelstein and
C. Montangero and
S. Antonelli and
S. Armitage and
R. Stevens Managing standards compliance . . . . . 836--851
E. C. Lupu and
M. Sloman Conflicts in policy-based distributed
systems management . . . . . . . . . . . 852--869
D. J. Simpson and
F. W. Burton Space efficient execution of
deterministic parallel programs . . . . 870--882
S. B. Yadav and
N. G. Shaw and
L. Webb and
C. Sutcu and
T. L. Roberts and
M. L. Gibson and
R. K. Rainer and
K. T. Fields Comments on ``Factors that impact
implementing a system development
methodology'' [with reply] . . . . . . . 279--286
T. L. Roberts and
M. L. Gibson and
R. K. Rainer and
K. T. Fields Response to ``Comments on factors that
impact the implementation of a systems
development methodology'' . . . . . . . 282--286
Ki-Seok Bang and
Jin-Young Choi and
Chuck Yoo Comments on ``The Model Checker SPIN'' 573--576
L. Pike A note on inconsistent axioms in
Rushby's ``Systematic formal
verification for fault-tolerant
time-triggered algorithms'' . . . . . . 347--348