Table of contents for issues of IEEE Transactions on Software Engineering

Last update: Wed May 26 07:06:49 MDT 2021                Valid HTML 3.2!

Volume SE-12, Number 10, October, 1986
Volume SE-12, Number 11, November, 1986
Volume 14, Number 11, November, 1988
Volume 15, Number 11, November, 1989
Volume 15, Number 12, December, 1989
Volume 16, Number 1, January, 1990
Volume 16, Number 2, February, 1990
Volume 16, Number 3, March, 1990
Volume 16, Number 4, April, 1990
Volume 16, Number 5, May, 1990
Volume 16, Number 6, June, 1990
Volume 16, Number 7, July, 1990
Volume 16, Number 8, August, 1990
Volume 16, Number 9, September, 1990
Volume 16, Number 10, October, 1990
Volume 16, Number 11, November, 1990
Volume 16, Number 12, December, 1990
Volume 17, Number 1, January, 1991
Volume 17, Number 2, February, 1991
Volume 17, Number 3, March, 1991
Volume 17, Number 4, April, 1991
Volume 17, Number 5, May, 1991
Volume 17, Number 6, June, 1991
Volume 17, Number 7, July, 1991
Volume 17, Number 8, August, 1991
Volume 17, Number 9, September, 1991
Volume 17, Number 10, October, 1991
Volume 17, Number 11, November, 1991
Volume 17, Number 12, December, 1991
Volume 18, Number 1, January, 1992
Volume 18, Number 2, February, 1992
Volume 18, Number 3, March, 1992
Volume 18, Number 4, April, 1992
Volume 18, Number 5, May, 1992
Volume 18, Number 6, June, 1992
Volume 18, Number 7, July, 1992
Volume 18, Number 8, August, 1992
Volume 18, Number 9, September, 1992
Volume 18, Number 10, October, 1992
Volume 18, Number 11, November, 1992
Volume 18, Number 12, December, 1992
Volume 19, Number 1, January, 1993
Volume 19, Number 2, February, 1993
Volume 19, Number 3, March, 1993
Volume 19, Number 4, April, 1993
Volume 19, Number 5, May, 1993
Volume 19, Number 6, June, 1993
Volume 19, Number 7, July, 1993
Volume 19, Number 8, August, 1993
Volume 19, Number 9, September, 1993
Volume 19, Number 10, October, 1993
Volume 19, Number 11, November, 1993
Volume 19, Number 12, December, 1993
Volume 20, Number 1, January, 1994
Volume 20, Number 2, February, 1994
Volume 20, Number 3, March, 1994
Volume 20, Number 4, April, 1994
Volume 20, Number 5, May, 1994
Volume 20, Number 6, June, 1994
Volume 20, Number 7, July, 1994
Volume 20, Number 8, August, 1994
Volume 20, Number 9, September, 1994
Volume 20, Number 10, October, 1994
Volume 20, Number 11, November, 1994
Volume 20, Number 12, December, 1994
Volume 21, Number 1, January, 1995
Volume 21, Number 2, February, 1995
Volume 21, Number 3, March, 1995
Volume 21, Number 4, April, 1995
Volume 21, Number 5, May, 1995
Volume 21, Number 6, June, 1995
Volume 21, Number 7, July, 1995
Volume 21, Number 8, August, 1995
Volume 21, Number 9, September, 1995
Volume 21, Number 10, October, 1995
Volume 21, Number 11, November, 1995
Volume 21, Number 12, December, 1995
Volume 22, Number 1, January, 1996
Volume 22, Number 2, February, 1996
Volume 22, Number 3, March, 1996
Volume 22, Number 4, April, 1996
Volume 22, Number 5, May, 1996
Volume 22, Number 6, June, 1996
Volume 22, Number 7, July, 1996
Volume 22, Number 8, August, 1996
Volume 22, Number 9, September, 1996
Volume 22, Number 10, October, 1996
Volume 22, Number 11, November, 1996
Volume 22, Number 12, December, 1996
Volume 23, Number 1, January, 1997
Volume 23, Number 2, February, 1997
Volume 23, Number 3, March, 1997
Volume 23, Number 4, April, 1997
Volume 23, Number 5, May, 1997
Volume 23, Number 6, June, 1997
Volume 23, Number 7, July, 1997
Volume 23, Number 8, August, 1997
Volume 23, Number 9, September, 1997
Volume 23, Number 10, October, 1997
Volume 23, Number 11, November, 1997
Volume 23, Number 12, December, 1997
Volume 24, Number 1, January, 1998
Volume 24, Number 2, February, 1998
Volume 24, Number 3, March, 1998
Volume 24, Number 4, April, 1998
Volume 24, Number 5, May, 1998
Volume 24, Number 6, June, 1998
Volume 24, Number 7, July, 1998
Volume 24, Number 8, August, 1998
Volume 24, Number 9, September, 1998
Volume 24, Number 10, October, 1998
Volume 24, Number 11, November, 1998
Volume 24, Number 12, December, 1998
Volume 25, Number 1, January / February, 1999
Volume 25, Number 2, March / April, 1999
Volume 25, Number 3, May / June, 1999
Volume 25, Number 4, July / August, 1999
Volume 25, Number 5, September / October, 1999
Volume 25, Number 6, November / December, 1999
Volume 27, Number 3, March, 2001
Volume 27, Number 6, June, 2001
Volume 32, Number 5, May, 2006


IEEE Transactions on Software Engineering
Volume SE-12, Number 10, October, 1986

                     D. Towsley   Allocating programs containing branches
                                  and loops within a multiple processor
                                  system . . . . . . . . . . . . . . . . . 1018--1024

IEEE Transactions on Software Engineering
Volume SE-12, Number 11, November, 1986

                   T. Y. Cheung   On the projection method for protocol
                                  verification . . . . . . . . . . . . . . 1088--1089


IEEE Transactions on Software Engineering
Volume 14, Number 11, November, 1988

                 C. C. Yang and   
                      G. Li and   
                    P. A. B. Ng   An improved algorithm based on subset
                                  closures for synthesizing a relational
                                  database scheme  . . . . . . . . . . . . 1731--1738


IEEE Transactions on Software Engineering
Volume 15, Number 11, November, 1989

                G. M. Karam and   
             C. M. Stanczyk and   
                     G. W. Bond   Critical races in Ada programs . . . . . 1471--1480

IEEE Transactions on Software Engineering
Volume 15, Number 12, December, 1989

                N. R. Howes and   
                   A. C. Weaver   Measurements of Ada overhead in
                                  OSI-style communications systems . . . . 1507--1517


IEEE Transactions on Software Engineering
Volume 16, Number 1, January, 1990

              C. P. Gerrard and   
                 D. Coleman and   
                R. M. Gallimore   Formal specification and design time
                                  testing  . . . . . . . . . . . . . . . . 1--12
                 Guo-Jie Li and   
                      B. W. Wah   Computational efficiency of parallel
                                  combinatorial OR-tree searches . . . . . 13--31
                E. Barcucci and   
                     R. Pinzani   Optimal selection of secondary indexes   32--38
              R. G. Willson and   
                    B. H. Krogh   Petri net tools for the specification
                                  and analysis of discrete controllers . . 39--50
                   L. K. Dillon   Verifying general safety properties of
                                  Ada tasking programs . . . . . . . . . . 51--63
                  G. C. Low and   
                  D. R. Jeffery   Function points in the estimation and
                                  evaluation of the software process . . . 64--71
                   W. E. Howden   Comments analysis and programming errors 72--81
                 R. C. De Vries   Reducing null messages in Misra's
                                  distributed discrete event simulation
                                  method . . . . . . . . . . . . . . . . . 82--91
                    S. B. Yadav   Control and definition modularization:
                                  an improved software design technique
                                  for organizing programs  . . . . . . . . 92--99
                    C. K. Chang   Bidding against competitors  . . . . . . 100--104

IEEE Transactions on Software Engineering
Volume 16, Number 2, February, 1990

               J. C. Browne and   
                     T. Lee and   
                       J. Werth   Experimental evaluation of a
                                  reusability-oriented parallel
                                  programming environment  . . . . . . . . 111--120
                  E. J. Weyuker   The cost of data flow testing: an
                                  empirical study  . . . . . . . . . . . . 121--128
                B. G. Ryder and   
                   W. Landi and   
                    H. D. Pande   Profiling an incremental data flow
                                  analysis algorithm . . . . . . . . . . . 129--140
                    Y. Levendel   Reliability analysis of large software
                                  systems: defect data modeling  . . . . . 141--152
             J. P. J. Kelly and   
                   S. C. Murphy   Achieving dependability throughout the
                                  development process: a distributed
                                  software experiment  . . . . . . . . . . 153--165
                   J. Arlat and   
                  M. Aguera and   
                    L. Amat and   
                 Y. Crouzet and   
                J. C. Fabre and   
               J. C. Laprie and   
                 E. Martins and   
                      D. Powell   Fault injection for dependability
                                  validation: a methodology and some
                                  applications . . . . . . . . . . . . . . 166--182
         V. Balasubramanian and   
                    P. Banerjee   Tradeoffs in the design of efficient
                                  algorithm-based error detection schemes
                                  for hypercube multiprocessors  . . . . . 183--196
                   D. Haban and   
                  D. Wybranietz   A hybrid monitor for behavior and
                                  performance analysis of distributed
                                  systems  . . . . . . . . . . . . . . . . 197--211
             M. H. Woodbury and   
                     K. G. Shin   Measurement and analysis of workload
                                  effects on fault latency in real-time
                                  systems  . . . . . . . . . . . . . . . . 212--216
                K. Gallivan and   
                  D. Gannon and   
                   W. Jalby and   
                  A. Malony and   
                    H. Wijshoff   Experimentally characterizing the
                                  behavior of multiprocessor memory
                                  systems: a case study  . . . . . . . . . 216--223
                   N. Gorla and   
             A. C. Benander and   
                 B. A. Benander   Debugging effort estimation using
                                  software metrics . . . . . . . . . . . . 223--231
                   B. Mortazavi   Performance of MAP in the remote
                                  operation of a CNC . . . . . . . . . . . 231--237
            S. S. Brilliant and   
               J. C. Knight and   
                  N. G. Leveson   Analysis of faults in an $N$-version
                                  software experiment  . . . . . . . . . . 238--247
              D. W. Cornell and   
                       P. S. Yu   An effective approach to vertical
                                  partitioning for physical design of
                                  relational databases . . . . . . . . . . 248--258

IEEE Transactions on Software Engineering
Volume 16, Number 3, March, 1990

                  F. A. Feldman   A new spectral test for nonrandomness
                                  and the DES  . . . . . . . . . . . . . . 261--267
              K. M. Olender and   
                L. J. Osterweil   Cecil: a sequencing constraint language
                                  for automatic static analysis generation 268--280
              J. L. Gaudiot and   
                        A. Sohn   Data-driven parallel production systems  281--293
                J. R. Cordy and   
                N. L. Eliot and   
                M. G. Robertson   TuringTool: a user interface to aid in
                                  the software maintenance task  . . . . . 294--301
                 T. Ibaraki and   
                  T. Kameda and   
                       N. Katoh   Multiversion cautious schedulers for
                                  database concurrency control . . . . . . 302--315
                 W. T. Tsai and   
                 D. Volovik and   
                    T. F. Keefe   Automated test case generation for
                                  programs specified by relational algebra
                                  queries  . . . . . . . . . . . . . . . . 316--324
                 Y. F. Chen and   
            M. Y. Nishimoto and   
              C. V. Ramamoorthy   The C information abstraction system . . 325--334
               S. K. Debray and   
                   D. S. Warren   Towards banishing the cut from Prolog    335--349
               V. F. Nicola and   
                       A. Goyal   Modeling of correlated failures and
                                  community error recovery in multiversion
                                  software . . . . . . . . . . . . . . . . 350--359
                      J. Xu and   
                   D. L. Parnas   Scheduling processes with release times,
                                  deadlines, precedence and exclusion
                                  relations  . . . . . . . . . . . . . . . 360--369
                    Y. Hirakawa   Comments, with reply, on ``On the
                                  projection method for protocol
                                  verification'' by T.-Y. Cheung . . . . . 370--371

IEEE Transactions on Software Engineering
Volume 16, Number 4, April, 1990

                  L. Y. Liu and   
             R. K. Shyamasundar   Static analysis of real-time distributed
                                  systems  . . . . . . . . . . . . . . . . 373--388
                   J. M. Bishop   The effect of data abstraction on loop
                                  programming techniques . . . . . . . . . 389--402
                   D. Harel and   
                H. Lachover and   
                  A. Naamad and   
                  A. Pnueli and   
                  M. Politi and   
                 R. Sherman and   
         A. Shtull-Trauring and   
                M. Trakhtenbrot   STATEMATE: a working environment for the
                                  development of complex reactive systems  403--414
                    A. Itai and   
                  S. Kutten and   
               Y. Wolfstahl and   
                        S. Zaks   Optimal distributed $t$-resilient
                                  election in complete networks  . . . . . 415--420
                   R. Gupta and   
                    M. L. Soffa   Region scheduling: an approach for
                                  detecting and redistributing parallelism 421--431
              N. G. Leveson and   
                  S. S. Cha and   
               J. C. Knight and   
                 T. J. Shimeall   The use of self checks and voting in
                                  software error detection: an empirical
                                  study  . . . . . . . . . . . . . . . . . 432--443
                Y. B. Shieh and   
                  D. Ghosal and   
         P. R. Chintamaneni and   
                 S. K. Tripathi   Modeling of hierarchical distributed
                                  systems with fault-tolerance . . . . . . 444--457
            S. Brocklehurst and   
                 P. Y. Chan and   
              B. Littlewood and   
                       J. Snell   Recalibrating software reliability
                                  models . . . . . . . . . . . . . . . . . 458--470
                      F. Kaudel   Comments on ``Allocating programs
                                  containing branches and loops within a
                                  multiple processor system'' by D.
                                  Towsley  . . . . . . . . . . . . . . . . 471
                  R. A. Nicholl   Unreachable states in model-oriented
                                  specifications . . . . . . . . . . . . . 472--477
                     D. Towsley   Correction to ``Allocating programs
                                  containing branches and loops within a
                                  multiple processor system''  . . . . . . 472
                 M. H. Eich and   
                   S. M. Garard   The performance of flow graph locking    477--483
                D. Callahan and   
                   A. Carle and   
                 M. W. Hall and   
                     K. Kennedy   Constructing the procedure call
                                  multigraph . . . . . . . . . . . . . . . 483--487

IEEE Transactions on Software Engineering
Volume 16, Number 5, May, 1990

                    G. M. Karam   Computational improvements in Prolog
                                  applications by predicate variable
                                  pointers . . . . . . . . . . . . . . . . 490--497
                    L. E. Moser   Data dependency graphs for Ada programs  498--509
               L. A. Laranjeira   Software size estimation of
                                  object-oriented systems  . . . . . . . . 510--522
                  T. Suzuki and   
                S. M. Shatz and   
                      T. Murata   A protocol modeling and verification
                                  approach based on a specification
                                  language and Petri nets  . . . . . . . . 523--536
                     D. Hoffman   On criteria for module interfaces  . . . 537--542
                    C. Ding and   
                      P. Mateti   A framework for the automated drawing of
                                  data structure diagrams  . . . . . . . . 543--557
                   J. K. Mullin   Optimal semijoins for distributed
                                  database systems . . . . . . . . . . . . 558--560

IEEE Transactions on Software Engineering
Volume 16, Number 6, June, 1990

                  D. McCullough   A hookup theorem for multilevel security 563--568
                 C. R. Tsai and   
               V. D. Gligor and   
           C. S. Chandersekaran   On the identification of covert storage
                                  channels in secure systems . . . . . . . 569--580
                   C. F. Yu and   
                   V. D. Gligor   A specification and verification method
                                  for preventing denial of service . . . . 581--592
                 T. F. Lunt and   
              D. E. Denning and   
               R. R. Schell and   
                 M. Heckman and   
                 W. R. Shockley   The SeaView security model . . . . . . . 593--607
               J. L. Berger and   
               J. Picciotto and   
          J. P. L. Woodward and   
                 P. T. Cummings   Compartmented mode workstation:
                                  prototype highlights . . . . . . . . . . 608--618
                S. R. White and   
                   L. Comerford   ABYSS: an architecture for software
                                  protection . . . . . . . . . . . . . . . 619--629
                  D. Hildum and   
                       J. Cohen   A language for specifying program
                                  transformations  . . . . . . . . . . . . 630--638
                   S. Leong and   
                   S. Jodis and   
                K. Sullivan and   
                   O. Jiang and   
              P. A. D. de Maine   A transportable programming language
                                  (TPL) system. II. The bifunctional
                                  compiler system  . . . . . . . . . . . . 639--646
                   W. P. Lu and   
              M. K. Sundareshan   A model for multilevel security in
                                  computer networks  . . . . . . . . . . . 647--659
                  M. Dubois and   
                   C. Scheurich   Memory access dependencies in
                                  shared-memory multiprocessors  . . . . . 660--673

IEEE Transactions on Software Engineering
Volume 16, Number 7, July, 1990

                  D. Sarkar and   
                         N. Deo   Estimating the speedup in parallel
                                  parsing  . . . . . . . . . . . . . . . . 677--683
                  I. K. Ryu and   
                   A. Thomasian   Performance analysis of dynamic locking
                                  with the no-waiting policy . . . . . . . 684--698
                 C. E. Houstics   Module allocation of real-time
                                  applications to distributed systems  . . 699--709
               J. W. Stamos and   
                  D. K. Gifford   Implementing remote evaluation . . . . . 710--722
                M. G. Burke and   
                    B. G. Ryder   A critical analysis of incremental
                                  iterative data flow analysis algorithms  723--728
               L. J. Chmura and   
               A. F. Norcio and   
                 T. J. Wicinski   Evaluating software design processes by
                                  analyzing change data over time  . . . . 729--740
                D. Hemmendinger   Specifying Ada server tasks with
                                  executable formal grammars . . . . . . . 741--754
                  S. S. Lam and   
                  A. U. Shankar   A relational notation for state
                                  transition systems . . . . . . . . . . . 755--775

IEEE Transactions on Software Engineering
Volume 16, Number 8, August, 1990

            V. M. Markowitz and   
                 J. A. Makowsky   Identifying extended entity-relationship
                                  object structures in relational schemas  777--790
                 B. Ciciani and   
                 D. M. Dias and   
                 B. R. Iyer and   
                       P. S. Yu   A hybrid distributed centralized system
                                  structure for transaction processing . . 791--806
               V. F. Nicola and   
               J. M. van Spanje   Comparative analysis of different models
                                  of checkpointing and recovery  . . . . . 807--821
           V. De Antonellis and   
                       B. Zonta   A disciplined approach to office
                                  analysis . . . . . . . . . . . . . . . . 822--828
                G. M. Karam and   
                  R. J. A. Buhr   Starvation and critical race analyzers
                                  for Ada  . . . . . . . . . . . . . . . . 829--843
                   L. J. Morell   A theory of fault-based testing  . . . . 844--857
               A. Valenzano and   
               P. Montuschi and   
                   L. Ciminiera   Some properties of timed token medium
                                  access protocols . . . . . . . . . . . . 858--869
                       B. Korel   Automated software test data generation  870--879
                    J. C. Huang   State constraints and pathwise
                                  decomposition of programs  . . . . . . . 880--896
              J. J. P. Tsai and   
                 K. Y. Fang and   
                 H. Y. Chen and   
                       Y. D. Bi   A noninterference monitoring and replay
                                  mechanism for real-time software testing
                                  and debugging  . . . . . . . . . . . . . 897--916
                           Luqi   A graph model for software evolution . . 917--927

IEEE Transactions on Software Engineering
Volume 16, Number 9, September, 1990

                    A. P. Moore   The specification and verified
                                  decomposition of system requirements
                                  using CSP  . . . . . . . . . . . . . . . 932--948
                F. K. Hanna and   
                  N. Daeche and   
                     M. Longley   Specification and verification using
                                  dependent types  . . . . . . . . . . . . 949--964
               A. Podgurski and   
                   L. A. Clarke   A formal model of program dependences
                                  and its implications for software
                                  testing, debugging, and maintenance  . . 965--979
                M. Moriconi and   
                  T. C. Winkler   Approximate reasoning about the semantic
                                  effects of program changes . . . . . . . 980--992
                A. J. Camilleri   Mechanizing CSP trace theory in higher
                                  order logic  . . . . . . . . . . . . . . 993--1004
               D. M. Goldschlag   Mechanically verifying concurrent
                                  programs with the Boyer--Moore prover    1005--1023
                    D. R. Smith   KIDS: a semiautomatic program
                                  development system . . . . . . . . . . . 1024--1043
              S. J. Garland and   
               J. V. Guttag and   
                  J. J. Horning   Debugging Larch shared language
                                  specifications . . . . . . . . . . . . . 1044--1057
                D. Guaspari and   
                 C. Marceau and   
                       W. Polak   Formal verification of Ada programs  . . 1058--1075
                     J. M. Wing   Using Larch to specify Avalon/C++
                                  objects  . . . . . . . . . . . . . . . . 1076--1088
             K. T. Narayana and   
                      S. Dharap   Formal specification of a look manager   1089--1103

IEEE Transactions on Software Engineering
Volume 16, Number 10, October, 1990

                R. V. Rubin and   
                  J. Walker and   
                    E. J. Golin   Early experience with the Visual
                                  Programmer's WorkBench . . . . . . . . . 1107--1121
                   C. Crimi and   
                 A. Guercio and   
                  G. Pacini and   
                 G. Tortora and   
                       M. Tucci   Automating visual language generation    1122--1135
                    S. K. Chang   A visual language compiler for
                                  information retrieval by visual
                                  reasoning  . . . . . . . . . . . . . . . 1136--1149
              M. Angelaccio and   
                 T. Catarci and   
                    G. Santucci   QBD*: a graphical query language with
                                  recursion  . . . . . . . . . . . . . . . 1150--1163
              M. Eisenstadt and   
                J. Domingue and   
                   T. Rajan and   
                       E. Motta   Visual knowledge engineering . . . . . . 1164--1177
                M. Hirakawa and   
                  M. Tanaka and   
                    T. Ichikawa   An iconic programming system, HI-VISUAL  1178--1184
                  A. Heydon and   
              M. W. Maimone and   
                J. D. Tygar and   
                 J. M. Wing and   
                 A. M. Zaremski   Miro: visual specification of security   1185--1197
                D. W. Craig and   
                 C. M. Woodside   The rejection rate for tasks with random
                                  arrivals, deadlines, and preemptive
                                  scheduling . . . . . . . . . . . . . . . 1198--1208
              G. N. Neufeld and   
                        Y. Yang   The design and implementation of an
                                  ASN.1-C compiler . . . . . . . . . . . . 1209--1220

IEEE Transactions on Software Engineering
Volume 16, Number 11, November, 1990

          C. V. Ramamoorthy and   
                   Y. Usuda and   
                 A. Prakash and   
                     W. T. Tsai   The evolution support environment system 1225--1234
          M. Degl'Innocenti and   
              G. L. Ferrari and   
                  G. Pacini and   
                      F. Turini   RSF: a formalism for executable
                                  requirement specifications . . . . . . . 1235--1246
                B. Hailpern and   
                      H. Ossher   Extending objects to support multiple
                                  interfaces and access control  . . . . . 1247--1257
              M. V. Mannino and   
                 J. J. Choi and   
                   D. S. Batory   The object-oriented functional data
                                  language . . . . . . . . . . . . . . . . 1258--1272
                      I. Suzuki   Formal analysis of the alternating bit
                                  protocol by temporal Petri nets  . . . . 1273--1281
                    Y. Wand and   
                       R. Weber   An ontological model of an information
                                  system . . . . . . . . . . . . . . . . . 1282--1292
                  J. Kramer and   
                       J. Magee   The evolving philosophers problem:
                                  dynamic change management  . . . . . . . 1293--1306
                  G. Becker and   
              L. Camarinopoulos   A Bayesian estimation method for the
                                  failure rate of a possibly correct
                                  program  . . . . . . . . . . . . . . . . 1307--1310
                  V. C. Barbosa   Strategies for the prevention of
                                  communication deadlocks in distributed
                                  parallel programs  . . . . . . . . . . . 1311--1316

IEEE Transactions on Software Engineering
Volume 16, Number 12, December, 1990

                     M. Singhal   Update transport: a new technique for
                                  update synchronization in replicated
                                  database systems . . . . . . . . . . . . 1325--1336
                 D. H. Pitt and   
                D. E. Freestone   The derivation of conformance tests from
                                  LOTOS specifications . . . . . . . . . . 1337--1343
                 J. Heering and   
                   P. Klint and   
                      J. Rekers   Incremental generation of parsers  . . . 1344--1351
                     D. A. Lamb   Specification of iterators . . . . . . . 1352--1360
                G. C. Roman and   
               H. C. Cunningham   Mixed programming metaphors in a shared
                                  dataspace model of concurrency . . . . . 1361--1373
                   D. Haban and   
                     K. G. Shin   Application of real-time monitoring to
                                  scheduling tasks with random execution
                                  times  . . . . . . . . . . . . . . . . . 1374--1389
              M. A. Al-Mouhamed   Lower bound on the number of processors
                                  and time for scheduling precedence
                                  graphs with communication costs  . . . . 1390--1401
                  D. Hamlet and   
                      R. Taylor   Partition testing does not inspire
                                  confidence [program testing] . . . . . . 1402--1411
             M. H. Erdogmus and   
                    R. Johnston   On the specification and synthesis of
                                  communicating processes  . . . . . . . . 1412--1426
                    J. Milewski   Functional data structures as updatable
                                  objects  . . . . . . . . . . . . . . . . 1427--1432
                 S. D. Lang and   
                Y. Manolopoulos   Efficient expressions for completely and
                                  partly unsuccessful batched search of
                                  tree-structured files  . . . . . . . . . 1433--1435
                    G. M. Karam   Comments on ``Measurements of Ada
                                  overhead in OSI-style communications
                                  systems''  . . . . . . . . . . . . . . . 1435--1439
              C. M. McNamee and   
                   R. A. Olsson   Comments on ``Critical races in Ada
                                  programs'' . . . . . . . . . . . . . . . 1439
              L. L. Constantine   Comments, with reply, on ``On criteria
                                  for module interfaces'' by D. Hoffman    1440


IEEE Transactions on Software Engineering
Volume 17, Number 1, January, 1991

                  I. Nakata and   
                       M. Sassa   Programming with streams in a
                                  Pascal-like language . . . . . . . . . . 1--9
              L. B. Protsko and   
             P. G. Sorenson and   
             J. P. Tremblay and   
                 D. A. Schaefer   Towards the automatic generation of
                                  software diagrams  . . . . . . . . . . . 10--21
            N. Roussopoulos and   
                    L. Mark and   
                  T. Sellis and   
                   C. Faloutsos   An architecture for high performance
                                  engineering information systems  . . . . 22--33
                B. A. Blake and   
                      K. Schwan   Experimental evaluation of a real-time
                                  scheduler for a multiprocessor system    34--44
                  K. C. Tai and   
               R. H. Carver and   
                    E. E. Obaid   Debugging concurrent Ada programs by
                                  deterministic execution  . . . . . . . . 45--63
           N. C. Hutchinson and   
                 L. L. Peterson   The $x$-Kernel: an architecture for
                                  implementing network protocols . . . . . 64--76
               T. K. Sellis and   
                     L. Shapiro   Query optimization for nontraditional
                                  database applications  . . . . . . . . . 77--86
                       X. Zhang   Performance measurement and modeling to
                                  evaluate various effects on a shared
                                  memory multiprocessor  . . . . . . . . . 87--93

IEEE Transactions on Software Engineering
Volume 17, Number 2, February, 1991

                  G. Florin and   
                      S. Natkin   Generalization of queueing network
                                  product form solutions to stochastic
                                  Petri nets . . . . . . . . . . . . . . . 99--107
               W. Henderson and   
                   P. G. Taylor   Embedded processes in stochastic Petri
                                  nets . . . . . . . . . . . . . . . . . . 108--116
                  J. Campos and   
                  G. Chiola and   
                       M. Silva   Ergodicity and throughput bounds of
                                  Petri nets with unique consistent firing
                                  count vector . . . . . . . . . . . . . . 117--125
                  I. Hatono and   
                K. Yamagata and   
                      H. Tamura   Modeling and online scheduling of
                                  flexible manufacturing systems using
                                  stochastic Petri nets  . . . . . . . . . 126--132
                        J. Gait   Stability, availability, and response in
                                  network file service . . . . . . . . . . 133--140
                R. W. Selby and   
                   V. R. Basili   Analyzing error-prone system structure   141--152
              J. M. Purtilo and   
                      P. Jalote   An environment for developing
                                  fault-tolerant software  . . . . . . . . 153--159
                  C. Ghezzi and   
               D. Mandrioli and   
                 S. Morasca and   
                       M. Pezze   A unified high-level Petri net formalism
                                  for time-critical systems  . . . . . . . 160--172
             T. J. Shimeall and   
                  N. G. Leveson   An empirical comparison of software
                                  fault tolerance and fault elimination    173--182
                   N. H. Minsky   The imposition of protocols over open
                                  distributed systems  . . . . . . . . . . 183--195
             W. S. Humphrey and   
             N. D. Singpurwalla   Predicting (individual) software
                                  productivity . . . . . . . . . . . . . . 196--207

IEEE Transactions on Software Engineering
Volume 17, Number 3, March, 1991

                        P. Zave   An insider's evaluation of PAISLey . . . 212--225
          H. B. Reubenstein and   
                   R. C. Waters   The Requirements Apprentice: automated
                                  assistance for requirements acquisition  226--240
                M. S. Jaffe and   
              N. G. Leveson and   
          M. P. E. Heimdahl and   
                  B. E. Melhart   Software requirements analysis for
                                  real-time process-control systems  . . . 241--258
              B. Berthomieu and   
                        M. Diaz   Modeling and verification of time
                                  dependent systems using time Petri nets  259--273
             F. A. Etessami and   
                     G. S. Hura   Rule-based design methodology for
                                  solving control problems . . . . . . . . 274--282
                D. E. Perry and   
                   G. E. Kaiser   Models of software development
                                  environments . . . . . . . . . . . . . . 283--295
                G. Z. Qadah and   
             L. J. Henschen and   
                      J. J. Kim   Efficient algorithms for the
                                  instantiated transitive closure queries  296--309
                   F. Belli and   
                P. Jedrzejowicz   An approach to the reliability
                                  optimization of software with redundancy 310--312

IEEE Transactions on Software Engineering
Volume 17, Number 4, April, 1991

             N. D. Singpurwalla   Determining an optimal time interval for
                                  testing and debugging software . . . . . 313--319
                  W. A. Muhanna   Composite programs: hierarchical
                                  construction, circularity, and deadlocks 320--333
                  K. Kanoun and   
    M. R. de Bastos Martini and   
                 J. M. de Souza   A method for software reliability
                                  analysis and prediction application to
                                  the TROPICO-R switching system . . . . . 334--344
                  F. Zahedi and   
                     N. Ashrafi   Software reliability allocation based on
                                  structure, utility, price, and cost  . . 345--356
                A. Braccini and   
               A. Del Bimbo and   
                     E. Vicario   Interprocess communication dependency on
                                  network load . . . . . . . . . . . . . . 357--369
               J. C. Laprie and   
                  K. Kanoun and   
                 C. Beounes and   
                    M. Kaaniche   The KAT
                                  (knowledge--action--transformation)
                                  approach to the modeling and evaluation
                                  of reliability and availability growth   370--382
              R. A. DeMillo and   
                   R. J. Lipton   Defining software by continuous, smooth
                                  functions  . . . . . . . . . . . . . . . 383--384

IEEE Transactions on Software Engineering
Volume 17, Number 5, May, 1991

               A. Thomasian and   
                      I. K. Ryu   Performance analysis of two-phase
                                  locking  . . . . . . . . . . . . . . . . 386--402
              E. W. Krauser and   
               A. P. Mathur and   
                     V. J. Rego   High performance software testing on
                                  SIMD machines  . . . . . . . . . . . . . 403--423
                D. E. Harms and   
                    B. W. Weide   Copying and swapping: influences on the
                                  design of reusable software components   424--435
                B. Dimitrov and   
                  Z. Khalil and   
                   N. Kolev and   
                      P. Petrov   On the optimal total processing time
                                  using checkpoints  . . . . . . . . . . . 436--442
                  D. Ghosal and   
                 G. Serazzi and   
                 S. K. Tripathi   The processor working set and its use in
                                  scheduling multiprocessor systems  . . . 443--453
               M. D. Fraser and   
                   K. Kumar and   
                V. K. Vaishnavi   Informal and formal requirements
                                  specification languages: bridging the
                                  gap  . . . . . . . . . . . . . . . . . . 454--466
                    U. Hahn and   
                   M. Jarke and   
                        T. Rose   Teamwork support in a knowledge-based
                                  information systems environment  . . . . 467--482
                   Y. Tohma and   
                  H. Yamano and   
                    M. Ohba and   
                      R. Jacoby   The estimation of parameters of the
                                  hypergeometric distribution and its
                                  application to the software reliability
                                  growth model . . . . . . . . . . . . . . 483--489

IEEE Transactions on Software Engineering
Volume 17, Number 6, June, 1991

                   Y. Dotan and   
                       B. Arazi   Using flat concurrent Prolog in system
                                  modeling . . . . . . . . . . . . . . . . 493--512
                   F. Belli and   
             K. E. Grosspietsch   Specification of fault-tolerant system
                                  issues by predicate/transition nets and
                                  regular expressions --- approach and
                                  case study . . . . . . . . . . . . . . . 513--526
                     S. Lee and   
                     S. Sluizer   An executable language for modeling
                                  simple behavior  . . . . . . . . . . . . 527--543
                      P. C. Chu   A contingency approach to estimating
                                  record selectivities . . . . . . . . . . 544--552
                 R. S. Freedman   Testability of software components . . . 553--564
                 A. Parrish and   
                   S. H. Zweben   Analysis and refinement of software test
                                  data adequacy properties . . . . . . . . 565--581
               M. van Genuchten   Why is software late? An empirical study
                                  of reasons for delay in software
                                  development  . . . . . . . . . . . . . . 582--590
                S. Fujiwara and   
             G. v. Bochmann and   
                 F. Khendek and   
                  M. Amalou and   
                    A. Ghedamsi   Test selection based on finite state
                                  models . . . . . . . . . . . . . . . . . 591--603
                     C. Hsu and   
                M. Bouziane and   
                 L. Rattner and   
                         L. Yee   Information resources management in
                                  heterogeneous, distributed environments:
                                  A metadatabase approach  . . . . . . . . 604--625
             J. R. Callahan and   
                  J. M. Purtilo   A packaging system for heterogeneous
                                  execution environments . . . . . . . . . 626--635
          J. C. Cherniavsky and   
                    C. H. Smith   On Weyuker's axioms for software
                                  complexity measures  . . . . . . . . . . 636--638

IEEE Transactions on Software Engineering
Volume 17, Number 7, July, 1991

               J. F. Beetem and   
                   A. F. Beetem   Incremental scanning and parsing with
                                  galaxy . . . . . . . . . . . . . . . . . 641--651
               Z. M. Wojcik and   
                   B. E. Wojcik   Rough grammar for efficient and
                                  fault-tolerant computing on a
                                  distributed system . . . . . . . . . . . 652--668
                 T. Shepard and   
                 J. A. M. Gagne   A pre-run-time scheduling algorithm for
                                  hard real-time systems . . . . . . . . . 669--677
               W. A. Litwin and   
            N. Roussopoulos and   
                    G. Levy and   
                        W. Hong   Trie Hashing with Controlled Load  . . . 678--691
             D. E. Eckhardt and   
             A. K. Caglayan and   
               J. C. Knight and   
                  L. D. Lee and   
           D. F. McAllister and   
                 M. A. Vouk and   
                 J. P. J. Kelly   An experimental evaluation of software
                                  redundancy as a strategy for improving
                                  reliability  . . . . . . . . . . . . . . 692--702
              E. J. Weyuker and   
                        B. Jeng   Analyzing partition testing strategies   703--711
                  U. Halici and   
                       A. Dogac   An optimistic locking technique for
                                  concurrency control in distributed
                                  databases  . . . . . . . . . . . . . . . 712--724
                        T. Kunz   The influence of different workload
                                  descriptions on a heuristic load
                                  balancing scheme . . . . . . . . . . . . 725--730
               S. K. Mishra and   
             V. V. Raghavan and   
                    N. F. Tzeng   Efficient algorithms for selection of
                                  recovery points in tree task models  . . 731--734

IEEE Transactions on Software Engineering
Volume 17, Number 8, August, 1991

             A. D. Stoyenko and   
             V. C. Hamacher and   
                     R. C. Holt   Analyzing hard-real-time programs for
                                  guaranteed schedulability  . . . . . . . 737--750
            K. B. Gallagher and   
                     J. R. Lyle   Using program slicing in software
                                  maintenance  . . . . . . . . . . . . . . 751--761
                   T. Niemi and   
                    K. Jarvelin   Prolog-based meta-rules for relational
                                  database representation and manipulation 762--788
         A. D. Kshemkalyani and   
                     M. Singhal   Invariant-based verification of a
                                  distributed deadlock detection algorithm 789--799
               Y. S. Maarek and   
                D. M. Berry and   
                   G. E. Kaiser   An information retrieval approach for
                                  automatically constructing software
                                  libraries  . . . . . . . . . . . . . . . 800--813
                   G. Babin and   
                 F. Lustman and   
                      P. Shoval   Specification and design of transactions
                                  in information systems: a formal
                                  approach . . . . . . . . . . . . . . . . 814--829
                  T. Nakajo and   
                        H. Kume   A case history analysis of software
                                  error cause-effect relationships . . . . 830--838
                 L. M. Taff and   
           J. W. Borchering and   
                  W. R. Hudgins   Estimeetings: development estimates and
                                  a front-end process for a large project  839--849

IEEE Transactions on Software Engineering
Volume 17, Number 9, September, 1991

                 F. Nishida and   
               S. Takamatsu and   
                  Y. Fujita and   
                        T. Tani   Semi-automatic program construction from
                                  specifications using library modules . . 853--871
                 D. G. Shin and   
                    K. B. Irani   Fragmenting relations horizontally using
                                  a knowledge-based approach . . . . . . . 872--883
           A. Coen-Porisini and   
                F. De Paoli and   
                  C. Ghezzi and   
                   D. Mandrioli   Software specialization via symbolic
                                  execution  . . . . . . . . . . . . . . . 884--899
              R. A. DeMillo and   
                   A. J. Offutt   Constraint-based automatic test data
                                  generation . . . . . . . . . . . . . . . 900--910
                M. G. Gouda and   
                      T. Herman   Adaptive programming . . . . . . . . . . 911--921
                   C. G. Rommen   The probability of load balancing
                                  success in a homogeneous network . . . . 922--933
              D. M. Hoffman and   
                    P. Strooper   Automated module testing in Prolog . . . 934--943
                 O. Wolfson and   
                S. Sengupta and   
                      Y. Yemini   Managing communication networks by
                                  monitoring databases . . . . . . . . . . 944--953
               Y. Breitbart and   
          D. Georgakopoulos and   
            M. Rusinkiewicz and   
                A. Silberschatz   On rigorous transaction scheduling . . . 954--960
         S. Cardenas-Garcia and   
                M. V. Zelkowitz   A management tool for evaluation of
                                  software design  . . . . . . . . . . . . 961--971
                Michael D. Vose   A linear algorithm for generating random
                                  numbers with a given distribution  . . . 972--975
                 S. C. Boyd and   
                        H. Ural   On the complexity of generating optimal
                                  test sequences . . . . . . . . . . . . . 976--978
                      G. Graefe   Heap-filter merge join: a new algorithm
                                  for joining medium-size inputs . . . . . 979--982

IEEE Transactions on Software Engineering
Volume 17, Number 10, October, 1991

                   I. Ahmad and   
                     A. Ghafoor   Semi-distributed load balancing for
                                  massively parallel multicomputer systems 987--1004
          N. Yazia-Pekergin and   
                  J. M. Vincent   Stochastic bounds on execution times of
                                  parallel programs  . . . . . . . . . . . 1005--1012
                   A. Gupta and   
             I. F. Akyildiz and   
                 R. M. Fujimoto   Performance analysis of Time Warp with
                                  multiple homogeneous processors  . . . . 1013--1027
          I. P. Radivojevic and   
                      J. Herath   Executing DSP applications in a
                                  fine-grained dataflow environment  . . . 1028--1041
             R. L. Bagrodia and   
                     C. C. Shen   MIDAS: integrated design and simulation
                                  of distributed systems . . . . . . . . . 1042--1058
                   X. Zhang and   
                         X. Qin   Performance prediction and evaluation of
                                  parallel processing on a NUMA
                                  multiprocessor . . . . . . . . . . . . . 1059--1068
                  J. Sztrik and   
                   D. Kouvatsos   Asymptotic analysis of a heterogeneous
                                  multiprocessor system in a randomly
                                  changing environment . . . . . . . . . . 1069--1075
                  W. W. Chu and   
                  C. M. Sit and   
                    K. K. Leung   Task response time for real-time
                                  distributed systems with resource
                                  contentions  . . . . . . . . . . . . . . 1076--1092
                 B. Plateau and   
                        K. Atif   Stochastic automata network of modeling
                                  parallel systems . . . . . . . . . . . . 1093--1108
                G. M. Karam and   
                  R. J. A. Buhr   Temporal logic-based deadlock analysis
                                  for Ada  . . . . . . . . . . . . . . . . 1109--1125
                K. Miriyala and   
                  M. T. Harandi   Automatic derivation of formal software
                                  specifications from informal
                                  descriptions . . . . . . . . . . . . . . 1126--1142

IEEE Transactions on Software Engineering
Volume 17, Number 11, November, 1991

               P. A. Karger and   
                M. E. Zurko and   
                D. W. Bonin and   
                A. H. Mason and   
                     C. E. Kahn   A retrospective on the VAX VMM security
                                  kernel . . . . . . . . . . . . . . . . . 1147--1165
             R. A. Kemmerer and   
                   P. A. Porras   Covert flow trees: a visual approach to
                                  analyzing covert storage channels  . . . 1166--1185
                       J. Jacob   A uniform presentation of
                                  confidentiality properties . . . . . . . 1186--1194
                    G. W. Smith   Modeling security-relevant data
                                  semantics  . . . . . . . . . . . . . . . 1195--1203
              G. S. Avrunin and   
                  U. A. Buy and   
              J. C. Corbett and   
               L. K. Dillon and   
                  J. C. Wileden   Automated analysis of concurrent systems
                                  with the constrained expression toolset  1204--1222

IEEE Transactions on Software Engineering
Volume 17, Number 12, December, 1991

               K. W. E. Lor and   
                    D. M. Berry   Automatic synthesis of SARA design
                                  models from system requirements  . . . . 1229--1240
                     J. Han and   
                         L. Liu   Efficient evaluation of multiple linear
                                  recursions . . . . . . . . . . . . . . . 1241--1252
          J. C. S. P. Leite and   
                  P. A. Freeman   Requirements validation through
                                  viewpoint resolution . . . . . . . . . . 1253--1269
             N. H. Madhavji and   
                     W. Schafer   Prism-methodology and process-oriented
                                  environment  . . . . . . . . . . . . . . 1270--1283
                 G. K. Gill and   
                  C. F. Kemerer   Cyclomatic complexity density and
                                  software maintenance productivity  . . . 1284--1288
           K. B. Lakshmanan and   
             S. Jayaprakash and   
                    P. K. Sinha   Properties of control-flow complexity
                                  measures . . . . . . . . . . . . . . . . 1289--1295


IEEE Transactions on Software Engineering
Volume 18, Number 1, January, 1992

              M. Satyanarayanan   The influence of scale on distributed
                                  file system design . . . . . . . . . . . 1--9
                 D. Coleman and   
                   F. Hayes and   
                        S. Bear   Introducing Objectcharts or how to use
                                  Statecharts in object-oriented design    8--18
             E. A. T. Merks and   
                 J. M. Dyck and   
                  R. D. Cameron   Language design for program manipulation 19--32
               K. W. Miller and   
               L. J. Morell and   
               R. E. Noonan and   
                 S. K. Park and   
                D. M. Nicol and   
              B. W. Murrill and   
                        M. Voas   Estimating the probability of failure
                                  when testing reveals no failures . . . . 33--43
               S. D. Carson and   
                       S. Setia   Analysis of the periodic update write
                                  policy for disk cache  . . . . . . . . . 44--54
                  M. Granda and   
                J. M. Drake and   
                 J. A. Gregorio   Performance evaluation of parallel
                                  systems by using unbounded generalized
                                  stochastic Petri nets  . . . . . . . . . 55--71
                  V. Grassi and   
              L. Donatiello and   
                       S. Tucci   On the optimal checkpointing of critical
                                  tasks and transaction-oriented systems   72--77
                 R. Ganesan and   
                       S. Weiss   Scalar memory references in pipelined
                                  multiprocessors: a performance study . . 78--86

IEEE Transactions on Software Engineering
Volume 18, Number 2, February, 1992

             J. W. Davidson and   
                   A. M. Holler   Subprogram inlining: a study of its
                                  effects on program execution time  . . . 89--102
          C. A. Waldspurger and   
                    T. Hogg and   
             B. A. Huberman and   
              J. O. Kephart and   
                W. S. Stornetta   Spawn: a distributed computational
                                  economy  . . . . . . . . . . . . . . . . 103--117
                   P. S. Yu and   
                     D. M. Dias   Analysis of hybrid concurrency control
                                  schemes for a high data contention
                                  environment  . . . . . . . . . . . . . . 118--129
               J. C. Laprie and   
                      K. Kanoun   X-ware reliability and availability
                                  modeling . . . . . . . . . . . . . . . . 130--147
                  H. C. Lin and   
              C. S. Raghavendra   A dynamic load-balancing policy with a
                                  central job dispatcher (LBC) . . . . . . 148--158
                       G. Pucci   A new approach to the modeling of
                                  recovery block structures  . . . . . . . 159--167
                B. J. Falkowski   Comments on an optimal set of indices
                                  for a relational database  . . . . . . . 168--171

IEEE Transactions on Software Engineering
Volume 18, Number 3, March, 1992

                 D. Paulson and   
                        Y. Wand   An automated approach to information
                                  systems decomposition  . . . . . . . . . 174--189
                  H. E. Bal and   
          M. Frans Kaashoek and   
            Andrew S. Tanenbaum   Orca: a language for parallel
                                  programming of distributed systems . . . 190--205
               R. N. Taylor and   
               D. L. Levine and   
                    C. D. Kelly   Structural testing of concurrent
                                  programs . . . . . . . . . . . . . . . . 206--215
                K. Y. Whang and   
                A. Malhotra and   
               G. H. Sockut and   
                   L. Burns and   
                     K. S. Choi   Two-dimensional specification of
                                  universal quantification in a graphical
                                  database query language  . . . . . . . . 216--224
                      H. Taylor   A lingua franca for concurrent logic
                                  programming  . . . . . . . . . . . . . . 225--236
                Z. Ammarguellat   A control-flow normalization algorithm
                                  and its complexity . . . . . . . . . . . 237--251
              Y. E. Papelis and   
                 T. L. Casavant   Specification and analysis of
                                  parallel/distributed software and
                                  systems by Petri nets with transition
                                  enabling functions . . . . . . . . . . . 252--261

IEEE Transactions on Software Engineering
Volume 18, Number 4, April, 1992

                  J. Verner and   
                        G. Tate   A software size model  . . . . . . . . . 265--278
                  B. Fields and   
            M. Elvang-Goransson   A VDM case study in mural  . . . . . . . 279--295
                 M. F. Pekergin   Parallel computing optimization in the
                                  Apollo Domain network  . . . . . . . . . 296--303
            G. A. Venkatesh and   
                  C. N. Fischer   SPARE: a development environment for
                                  program analysis algorithms  . . . . . . 304--318
                    M. W. Mutka   Estimating capacity for sharing in a
                                  privately owned workstation environment  319--328
                   R. B. France   Semantically extended dataflow diagrams:
                                  a formal specification tool  . . . . . . 329--346
                   P. S. Yu and   
                 M. S. Chen and   
                H. U. Heiss and   
                         S. Lee   On workload characterization of
                                  relational database environments . . . . 347--355

IEEE Transactions on Software Engineering
Volume 18, Number 5, May, 1992

               E. Steegmans and   
                    J. Lewi and   
                I. van Horebeek   Generation of interactive parsers with
                                  error handling . . . . . . . . . . . . . 357--367
                A. P. Sinha and   
                      I. Vessey   Cognitive fit: an empirical study of
                                  recursion and iteration  . . . . . . . . 368--379
                 N. H. Madhavji   Environment evolution: the Prism model
                                  of changes . . . . . . . . . . . . . . . 380--392
                     Q. Cui and   
                      J. Gannon   Data-oriented exception handling . . . . 393--401
              K. C. Kinsley and   
                   C. E. Hughes   Analysis of a virtual memory model for
                                  maintaining database views . . . . . . . 402--409
             N. F. Schneidewind   Methodology for validating software
                                  metrics  . . . . . . . . . . . . . . . . 410--422
               J. C. Munson and   
             T. M. Khoshgoftaar   The detection of fault-prone programs    423--433
               L. Kleinrock and   
                    J. H. Huang   On parallel processing systems: Amdahl's
                                  law generalized and some results on
                                  optimal design . . . . . . . . . . . . . 434--447

IEEE Transactions on Software Engineering
Volume 18, Number 6, June, 1992

                    C. Rich and   
                  Y. A. Feldman   Seven layers of knowledge representation
                                  and reasoning in support of software
                                  development  . . . . . . . . . . . . . . 451--469
                  S. Fickas and   
                     B. R. Helm   Knowledge representation and reasoning
                                  in the design of composite systems . . . 470--482
              J. Mylopoulos and   
                   L. Chung and   
                       B. Nixon   Representing and using nonfunctional
                                  requirements: a process-oriented
                                  approach . . . . . . . . . . . . . . . . 483--497
                  B. Ramesh and   
                        V. Dhar   Supporting systems development by
                                  capturing deliberations during
                                  requirements engineering . . . . . . . . 498--510
                 G. Fischer and   
              A. Girgensohn and   
                K. Nakakoji and   
                    D. Redmiles   Supporting software designers with
                                  integrated domain-oriented design
                                  environments . . . . . . . . . . . . . . 511--522
              D. E. Setliff and   
                 R. A. Rutenbar   Knowledge representation and reasoning
                                  in a software synthesis architecture . . 523--533
                  F. Cacace and   
                    S. Ceri and   
                   L. Tanca and   
             S. Crespi-Reghizzi   Designing and prototyping data-intensive
                                  applications in the Logres and Algres
                                  programming environment  . . . . . . . . 534--546

IEEE Transactions on Software Engineering
Volume 18, Number 7, July, 1992

             G. L. Heileman and   
           M. Georgiopoulos and   
                    W. D. Roome   A general framework for concurrent
                                  simulation on neural network models  . . 551--562
             N. Karunanithi and   
                 D. Whitley and   
                  Y. K. Malaiya   Prediction of software reliability using
                                  connectionist models . . . . . . . . . . 563--574
               E. Mesrobian and   
                    J. Skrzypek   A software environment for studying
                                  computational neural systems . . . . . . 575--589
            A. Stafylopatis and   
                       A. Likas   Pictorial information retrieval using
                                  the random neural network  . . . . . . . 590--600
                    L. S. Smith   A framework for neural net specification 601--612
                  S. T. Kim and   
          K. Suwunboriruksa and   
                  S. Herath and   
              A. Jayasumana and   
                      J. Herath   Algorithmic transformations for neural
                                  computing and performance of supervised
                                  learning on a dataflow machine . . . . . 613--623
                   M. Sahinoglu   Compound-Poisson software reliability
                                  model  . . . . . . . . . . . . . . . . . 624--630
                    K. Kato and   
                      T. Masuda   Persistent Caching: An Implementation
                                  Technique for Complex Objects with
                                  Object Identity  . . . . . . . . . . . . 631--645
                G. S. Novak and   
                 F. N. Hill and   
                  M. L. Wan and   
                    B. G. Sayrs   Negotiated interfaces for software reuse 646--653

IEEE Transactions on Software Engineering
Volume 18, Number 8, August, 1992

                  J. E. B. Moss   Working with persistent objects: to
                                  swizzle or not to swizzle  . . . . . . . 657--673
                   Z. Manna and   
                   R. Waldinger   Fundamentals of deductive program
                                  synthesis  . . . . . . . . . . . . . . . 674--704
                    G. Nota and   
                      G. Pacini   Querying of executable software
                                  specifications . . . . . . . . . . . . . 705--716
                     J. M. Voas   PIE: a dynamic failure-based technique   717--727
                    D. Wang and   
                   B. Schurmann   Computer aided analysis and derivation
                                  for artificial neural systems  . . . . . 728--735
                  K. Schwan and   
                        H. Zhou   Dynamic scheduling of hard real-time
                                  tasks and real-time threads  . . . . . . 736--748
                 R. R. Lutz and   
                  J. S. K. Wong   Detecting unsafe error recovery
                                  schedules  . . . . . . . . . . . . . . . 749--760

IEEE Transactions on Software Engineering
Volume 18, Number 9, September, 1992

                  R. Gerber and   
                         I. Lee   A layered approach to automating the
                                  verification of real-time systems  . . . 768--784
               N. Halbwachs and   
                 F. Lagnier and   
                       C. Ratel   Programming and verifying real-time
                                  systems by means of the synchronous
                                  data-flow language LUSTRE  . . . . . . . 785--793
                X. Nicollin and   
                 J. Sifakis and   
                      S. Yovine   Compiling real-time specifications into
                                  extended automata  . . . . . . . . . . . 794--804
                     A. C. Shaw   Communicating real-time state machines   805--816
               B. P. Mahony and   
                    I. J. Hayes   A case-study in timed refinement: a mine
                                  pump . . . . . . . . . . . . . . . . . . 817--826
                   I. Greif and   
                 A. Seliger and   
                       W. Weihl   A case study of CES: a distributed
                                  collaborative editing system implemented
                                  in Argus . . . . . . . . . . . . . . . . 827--839
                    L. Mark and   
                 R. J. Cochrane   Grammars and relations . . . . . . . . . 840--849

IEEE Transactions on Software Engineering
Volume 18, Number 10, October, 1992

              W. L. Johnson and   
              M. S. Feather and   
                   D. R. Harris   Representation and presentation of
                                  requirements knowledge . . . . . . . . . 853--869
                    W. Mark and   
                   S. Tyler and   
                 J. McGuire and   
                 J. Schlossberg   Commitment-based software development    870--885
                    M. Oivo and   
                   V. R. Basili   Representing software engineering
                                  models: the TAME goal oriented approach  886--898
                 B. Ciciani and   
                 D. M. Dias and   
                       P. S. Yu   Analysis of concurrency-coherency
                                  control protocols for distributed
                                  transaction processing systems with
                                  regional locality  . . . . . . . . . . . 899--914
            T. Mukhopadhyay and   
                       S. Kekre   Software effort models for early
                                  estimation of process control
                                  applications . . . . . . . . . . . . . . 915--924

IEEE Transactions on Software Engineering
Volume 18, Number 11, November, 1992

               L. C. Briand and   
               V. R. Basili and   
                   W. M. Thomas   A pattern recognition approach for
                                  software engineering data analysis . . . 931--942
              R. Chillarege and   
             I. S. Bhandari and   
                J. K. Chaar and   
             M. J. Halliday and   
               D. S. Moebus and   
                  B. K. Ray and   
                     M. Y. Wong   Orthogonal defect classification --- a
                                  concept for in-process measurements  . . 943--956
                 S. C. Eick and   
              J. L. Steffen and   
                   E. E. Sumner   Seesoft --- a tool for visualizing line
                                  oriented software statistics . . . . . . 957--968
                    Y. Liao and   
                       D. Cohen   A specificational approach to high level
                                  program monitoring and measuring . . . . 969--978
         T. M. Khoshgoftaar and   
               J. C. Munson and   
         B. B. Bhattacharya and   
               G. D. Richardson   Predictive modeling techniques of
                                  software quality from software measures  979--987
              W. W. Agresti and   
                   W. M. Evanco   Projecting software defects from
                                  analyzing Ada designs  . . . . . . . . . 988--997
          M. K. Daskalantonakis   A practical view of software measurement
                                  and implementation experiences within
                                  Motorola . . . . . . . . . . . . . . . . 998--1010
              C. F. Kemerer and   
                   B. S. Porter   Improving the reliability of function
                                  point measurement: an empirical study    1011--1024
                    W. Harrison   An entropy-based measure of software
                                  complexity . . . . . . . . . . . . . . . 1025--1029
                       C. Ebert   Correspondence visualization techniques
                                  for analyzing and evaluating software
                                  measures . . . . . . . . . . . . . . . . 1029--1034

IEEE Transactions on Software Engineering
Volume 18, Number 12, December, 1992

                     V. Rajlich   Guest Editor's introduction: special
                                  issue on software maintenance  . . . . . 1037--1037
                   N. Wilde and   
                       R. Huitt   Maintenance support for object-oriented
                                  programs . . . . . . . . . . . . . . . . 1038--1044
                  M. Lejter and   
                  S. Meyers and   
                    S. P. Reiss   Support for maintaining object-oriented
                                  programs . . . . . . . . . . . . . . . . 1045--1052
                 G. Canfora and   
                A. Cimitile and   
                  U. de Carlini   A logic-based approach to reverse
                                  engineering tools production . . . . . . 1053--1064
             W. Kozaczynski and   
                    J. Ning and   
                    A. Engberts   Program concept recognition and
                                  transformation . . . . . . . . . . . . . 1065--1075
              J. J. P. Tsai and   
                 T. Weigert and   
                     H. C. Jang   A hybrid knowledge representation as a
                                  basis of requirement specification and
                                  specification analysis . . . . . . . . . 1076--1100


IEEE Transactions on Software Engineering
Volume 19, Number 1, January, 1993

               R. W. Butler and   
                  G. B. Finelli   The infeasibility of quantifying the
                                  reliability of life-critical real-time
                                  software . . . . . . . . . . . . . . . . 3--12
               J. M. Rushby and   
                   F. von Henke   Formal verification of algorithms for
                                  critical systems . . . . . . . . . . . . 13--23
                J. M. Atlee and   
                      J. Gannon   State-based model checking of
                                  event-driven system requirements . . . . 24--40
                 A. P. Ravn and   
                 H. Rischel and   
                   K. M. Hansen   Specifying and verifying requirements of
                                  real-time systems  . . . . . . . . . . . 41--55
                R. Kurki-Suonio   Stepwise design of real-time systems . . 56--69
                      J. Xu and   
                   D. L. Parnas   On satisfying timing constraints in
                                  hard-real-time systems . . . . . . . . . 70--84

IEEE Transactions on Software Engineering
Volume 19, Number 2, February, 1993

                  G. Chiola and   
               M. A. Marsan and   
                   G. Balbo and   
                       G. Conte   Generalized stochastic Petri nets: a
                                  definition at the net level and its
                                  implications . . . . . . . . . . . . . . 89--107
                   Y. Huang and   
                 S. K. Tripathi   Resource allocation for primary-site
                                  fault-tolerant systems . . . . . . . . . 108--119
                   A. Delis and   
                N. Roussopoulos   Performance comparison of three modern
                                  DBMS architectures . . . . . . . . . . . 120--138
                          J. Xu   Multiprocessor scheduling of processes
                                  with release times, deadlines,
                                  precedence, and exclusion relations  . . 139--154
                   K. L. Wu and   
                    W. K. Fuchs   Rapid transaction-undo recovery using
                                  twin-page storage management . . . . . . 155--164
                 G. Richter and   
                      B. Maffeo   Toward a rigorous interpretation of
                                  ESML-extended systems modeling language  165--180
                   P. V. Rangan   Trust requirements and performance of a
                                  fast subtransport-level protocol for
                                  secure communication . . . . . . . . . . 181--186
             A. K. Agrawala and   
                     B. N. Jain   Deterministic model and transient
                                  analysis of virtual circuits . . . . . . 187--197
                   M. Young and   
               D. L. Levine and   
                   R. N. Taylor   Comments on ``Temporal logic-based
                                  deadlock analysis for Ada'' by G. M.
                                  Karam and R. J. A. Burh  . . . . . . . . 198--199
          M. K. Daskalantonakis   Correction to ``A practical view of
                                  software measurement and implementation
                                  experiences within Motorola''  . . . . . 199--200

IEEE Transactions on Software Engineering
Volume 19, Number 3, March, 1993

               P. G. Frankl and   
                  E. J. Weyuker   A formal analysis of the fault-detecting
                                  ability of testing methods . . . . . . . 202--213
              E. R. Gansner and   
              E. Koutsofios and   
                S. C. North and   
                       K. P. Vo   A technique for drawing directed graphs  214--230
                J. Micallef and   
                   G. E. Kaiser   Support algorithms for incremental
                                  attribute evaluation of asynchronous
                                  subtree replacements . . . . . . . . . . 231--252
                 D. T. Peng and   
                     K. G. Shin   Optimal scheduling of cooperative tasks
                                  in a distributed system using an
                                  enumerative method . . . . . . . . . . . 253--267
                  J. Plaice and   
                    W. W. Wadge   A new approach to version control  . . . 268--276
                 G. C. Roma and   
               R. F. Gamble and   
                     W. E. Ball   Formal derivation of rule-based programs 277--296
              J. P. Ukelson and   
                J. D. Gould and   
                    S. J. Boies   User navigation in computer applications 297--306
                      N. Y. Foo   Comments on ``Defining software by
                                  continuous smooth functions'' by R. A.
                                  De Millo and R. J. Lipton  . . . . . . . 307--309
                      J. Xu and   
                   D. L. Parnas   Correction to `On satisfying timing
                                  constraints in hard-real-time systems'
                                  by J. Xu and D. L. Parnas  . . . . . . . 310

IEEE Transactions on Software Engineering
Volume 19, Number 4, April, 1993

           K. J. Lieberherr and   
                        C. Xiao   Object-oriented software evolution . . . 313--343
                  C. Batini and   
             G. Di Battista and   
                    G. Santucci   Structuring primitives for a dictionary
                                  of entity relationship data schemas  . . 344--365
                    T. Camp and   
                  P. Kearns and   
                       M. Ahuja   Proof rules for flush channels . . . . . 366--378
               R. D. Banker and   
             R. J. Kauffman and   
                       D. Zweig   Repository evaluation of software reuse  379--389
               M. Y. M. Yen and   
                  R. W. Scamell   A human factors experimental comparison
                                  of SQL and QBE . . . . . . . . . . . . . 390--409
                        L. Ness   L.0: a truly concurrent executable
                                  temporal logic language for protocols    410--423

IEEE Transactions on Software Engineering
Volume 19, Number 5, May, 1993

                 T. Miyoshi and   
                       M. Azuma   An empirical study of evaluating
                                  software development environment quality 425--435
                 V. Berzins and   
                       Luqi and   
                     A. Yehudai   Using transformations in
                                  specification-based prototyping  . . . . 436--452
                  B. Kramer and   
                       Luqi and   
                     V. Berzins   Compositional semantics of a real-time
                                  prototyping language . . . . . . . . . . 453--477
                R. E. Strom and   
                   D. M. Yellin   Extending typestate checking using
                                  conditional liveness analysis  . . . . . 478--485
                G. Iazeolla and   
                   F. Marinuzzi   LISPACK --- a methodology and tool for
                                  the performance analysis of parallel
                                  systems and algorithms . . . . . . . . . 486--502
              M. G. Staskauskas   Formal derivation of concurrent
                                  programs: an example from industry . . . 503--528
              D. R. Jeffery and   
                  G. C. Low and   
                      M. Barnes   A comparison of function point counting
                                  techniques . . . . . . . . . . . . . . . 529--532

IEEE Transactions on Software Engineering
Volume 19, Number 6, June, 1993

           D. J. Richardson and   
                 M. C. Thompson   An analysis of test data selection
                                  criteria using the RELAY model of fault
                                  detection  . . . . . . . . . . . . . . . 533--553
             E. V. Sorensen and   
                 J. Nordahl and   
                   N. H. Hansen   From CSP models to Markov models . . . . 554--570
              P. Ramanathan and   
                     K. G. Shin   Use of common time base for
                                  checkpointing and rollback recovery in a
                                  distributed system . . . . . . . . . . . 571--583
              M. J. Harrold and   
                      B. Malloy   A unified interprocedural program
                                  representation for a maintenance
                                  environment  . . . . . . . . . . . . . . 584--593
                 N. R. Adam and   
                      R. Tewari   Regeneration with virtual copies for
                                  distributed computing systems  . . . . . 594--602
          T. K. Abdel-Hamid and   
                K. Sengupta and   
                       D. Ronan   Software project control: an
                                  experimental investigation of judgment
                                  with fallible information  . . . . . . . 603--612
                  H. C. Rao and   
                 L. L. Peterson   Accessing files in an Internet: the Jade
                                  file system  . . . . . . . . . . . . . . 613--624
                     A. Kay and   
                     J. N. Reed   A rely and guarantee method for timed
                                  CSP: a specification and design of a
                                  telephone exchange . . . . . . . . . . . 625--639
                 G. Canfora and   
                A. Cimitile and   
                  U. de Carlini   Correction to ``A logic-based approach
                                  to reverse engineering tools production
                                  (Dec 92 1053--1064)  . . . . . . . . . . 640
                   M. R. Girgis   Corrigendum for ``Constraint-based
                                  automatic test data generation'' by R.
                                  A. DeMillo and A. J. Offutt  . . . . . . 640

IEEE Transactions on Software Engineering
Volume 19, Number 7, July, 1993

                  F. Grandi and   
                   M. R. Scalas   Block access estimation for clustered
                                  data using a finite LRU buffer . . . . . 641--660
                    R. Rask and   
                P. Laamanen and   
                   K. Lyyttinen   Simulation and comparison of Albrecht's
                                  function point and DeMarco's function
                                  bang metrics in a CASE environment . . . 661--671
                  J. Biswas and   
                   J. C. Browne   Data structures for parallel resource
                                  management . . . . . . . . . . . . . . . 672--686
            M. Z. Tsoukalas and   
                J. W. Duran and   
                   S. C. Ntafos   On some reliability estimation problems
                                  in random and partition testing  . . . . 687--697
              S. Rangarajan and   
                  P. Jalote and   
                 S. K. Tripathi   Capacity of voting systems . . . . . . . 698--706
                       A. Sears   Layout appropriateness: a metric for
                                  evaluating user interface widget layout  707--719
                C. U. Smith and   
                 L. G. Williams   Software performance engineering: a case
                                  study including performance comparison
                                  with design alternatives . . . . . . . . 720--741
              A. S. Parrish and   
                   S. H. Zweben   Clarifying some fundamental concepts in
                                  software testing . . . . . . . . . . . . 742--746

IEEE Transactions on Software Engineering
Volume 19, Number 8, August, 1993

                  G. Graefe and   
                  D. L. Davison   Encapsulation of parallelism and
                                  architecture-independence in extensible
                                  database query execution . . . . . . . . 749--764
                  T. Nakajo and   
                   I. Azuma and   
                        M. Tada   A case history development of a
                                  foolproofing interface documentation
                                  system . . . . . . . . . . . . . . . . . 765--773
               P. G. Frankl and   
                    S. N. Weiss   An experimental comparison of the
                                  effectiveness of branch testing and data
                                  flow testing . . . . . . . . . . . . . . 774--787
              B. Hamidzadeh and   
                     S. Shekhar   Specification and analysis of real-time
                                  problem solvers  . . . . . . . . . . . . 788--803
                  W. W. Chu and   
                    I. T. Ieong   A transaction-based approach to vertical
                                  partitioning for relational database
                                  systems  . . . . . . . . . . . . . . . . 804--812
              J. L. Hellerstein   Achieving service rate objectives with
                                  decay usage scheduling . . . . . . . . . 813--825
                R. Govindarajan   Exception handlers in functional
                                  programming languages  . . . . . . . . . 826--834
                   P. Di Felice   Reusability of mathematical software: a
                                  contribution . . . . . . . . . . . . . . 835--843

IEEE Transactions on Software Engineering
Volume 19, Number 9, September, 1993

                   M. Ahuja and   
                 T. Carlson and   
                      A. Gahlot   Passive-space and time view: vector
                                  clocks for achieving higher performance,
                                  program correction, and distributed
                                  computing  . . . . . . . . . . . . . . . 845--855
                   D. L. Parnas   Predicate logic for software engineering 856--862
             A. M. K. Cheng and   
               J. C. Browne and   
                  A. K. Mok and   
                   Rwo-Hsi Wang   Analysis of real-time rule-based systems
                                  with behavioral constraint assertions
                                  specified in Estella . . . . . . . . . . 863--885
                  P. Helman and   
                     G. Liepins   Statistical foundations of audit trail
                                  analysis for the detection of computer
                                  misuse . . . . . . . . . . . . . . . . . 886--901
               Ing-Ray Chen and   
                  S. A. Banawan   Modeling and analysis of concurrent
                                  maintenance policies for data structures
                                  using pointers . . . . . . . . . . . . . 902--911
                  E. J. Weyuker   More experience with data flow testing   912--919
              D. I. Katcher and   
                 H. Arakawa and   
               J. K. Strosnider   Engineering and analysis of fixed
                                  priority schedulers  . . . . . . . . . . 920--934
                 J. J. Shilling   Incremental LL(1) parsing in
                                  language-based editors . . . . . . . . . 935--940

IEEE Transactions on Software Engineering
Volume 19, Number 10, October, 1993

              J. A. Solheim and   
                  J. H. Rowland   An empirical study of testing and
                                  integration strategies using artificial
                                  software systems . . . . . . . . . . . . 941--949
              L. F. Cabrera and   
            J. A. McPherson and   
              P. M. Schwarz and   
                   J. C. Wyllie   Implementing atomicity in two systems:
                                  techniques, tradeoffs, and experience    950--961
               P. G. Frankl and   
                  E. J. Weyuker   Provable improvements on branch testing  962--975
                        Bin Qin   Meet real-time requirements of parallel
                                  programs and maximally utilize system
                                  resources  . . . . . . . . . . . . . . . 976--981
                   P. S. Yu and   
                     D. M. Dias   Performance analysis of concurrency
                                  control using locking with deferred
                                  blocking . . . . . . . . . . . . . . . . 982--996
               A. Del Bimbo and   
                M. Campanai and   
                        P. Nesi   A three-dimensional iconic environment
                                  for image database querying  . . . . . . 997--1011

IEEE Transactions on Software Engineering
Volume 19, Number 11, November, 1993

                   A. Arora and   
                       M. Gouda   Closure and convergence: a foundation of
                                  fault-tolerant computing . . . . . . . . 1015--1027
               L. C. Briand and   
              V. R. Brasili and   
                C. J. Hetmanski   Developing interpretable models with
                                  optimized set reduction for identifying
                                  high-risk software components  . . . . . 1028--1044
          S. A. Vander Wiel and   
                    L. G. Votta   Assessing software designs using
                                  capture-recapture methods  . . . . . . . 1045--1054
                J. K. Chaar and   
             M. J. Halliday and   
             I. S. Bhandari and   
                  R. Chillarege   In-process evaluation for software
                                  inspection and test  . . . . . . . . . . 1055--1070
                L. A. Tomek and   
              J. K. Muppala and   
                  K. S. Trivedi   Modeling correlation in software
                                  recovery blocks  . . . . . . . . . . . . 1071--1086
              Y. K. Malaiya and   
          A. von Mayrhauser and   
                  P. K. Srimani   An examination of fault exposure ratio   1087--1094
             N. F. Schneidewind   Software reliability model with optimal
                                  selection of failure data  . . . . . . . 1095--1104
                  W. I. Kao and   
                 R. K. Iyer and   
                        D. Tang   FINE: A fault injection and monitoring
                                  environment for tracing the UNIX system
                                  behavior under faults  . . . . . . . . . 1105--1118
                  O. Berman and   
                     N. Ashrafi   Optimization models for reliability of
                                  modular software systems . . . . . . . . 1119--1123

IEEE Transactions on Software Engineering
Volume 19, Number 12, December, 1993

           S. C. Bandinelli and   
                A. Fuggetta and   
                      C. Ghezzi   Software process model evolution in the
                                  SPADE environment  . . . . . . . . . . . 1128--1144
             M. L. Jaccheri and   
                     R. Conradi   Techniques for process model evolution
                                  in EPOS  . . . . . . . . . . . . . . . . 1145--1156
                I. Bhandari and   
                M. Halliday and   
                  E. Tarver and   
                   D. Brown and   
                   J. Chaar and   
                  R. Chillarege   A case study of software process
                                  improvement during development . . . . . 1157--1170
              Wei Kuan Shih and   
               J. W. S. Liu and   
                      C. L. Liu   Modified rate-monotonic algorithm for
                                  scheduling periodic jobs with deferred
                                  deadlines  . . . . . . . . . . . . . . . 1171--1179


IEEE Transactions on Software Engineering
Volume 20, Number 1, January, 1994

                   P. B. Danzig   Flow control for limited buffer
                                  multicast  . . . . . . . . . . . . . . . 1--12
              M. G. Harbour and   
                M. H. Klein and   
                 J. P. Lehoczky   Timing analysis for fixed-priority
                                  scheduling of hard real-time systems . . 13--28
               T. Higashino and   
                 G. v. Bochmann   Automatic analysis and test case
                                  derivation for a restricted class of
                                  LOTOS expressions with data parameters   29--42
         A. D. Kshemkalyani and   
                     M. Singhal   Efficient detection and resolution of
                                  generalized distributed deadlocks  . . . 43--54
                  S. S. Lam and   
                  A. U. Shankar   A theory of interfaces and modules
                                  $I$-composition theorem  . . . . . . . . 55--71
                     G. Luo and   
                     A. Das and   
                 G. v. Bochmann   Software testing based on SDL
                                  specifications with save . . . . . . . . 72--87
                 M. D. Rice and   
                  S. B. Seidman   A formal model for module
                                  interconnection languages  . . . . . . . 88--101

IEEE Transactions on Software Engineering
Volume 20, Number 2, February, 1994

             Jong-Deok Choi and   
                  R. Cytron and   
                    J. Ferrante   On the efficient engineering of
                                  ambitious program analysis . . . . . . . 105--114
                  Jianan Li and   
                  I. Suzuki and   
                   M. Yamashita   A new structural induction theorem for
                                  rings of temporal Petri nets . . . . . . 115--126
                  M. Felder and   
               D. Mandrioli and   
                    A. Morzenti   Proving properties of real-time systems
                                  through logical specifications and Petri
                                  net models . . . . . . . . . . . . . . . 127--141
               P. E. Ammann and   
            S. S. Brilliant and   
                   J. C. Knight   The effect of imperfect error detection
                                  on reliability assessment via life
                                  testing  . . . . . . . . . . . . . . . . 142--148
                   Gang Luo and   
            G. von Bochmann and   
                    A. Petrenko   Test selection based on communicating
                                  nondeterministic finite-state machines
                                  using a generalized Wp-method  . . . . . 149--162

IEEE Transactions on Software Engineering
Volume 20, Number 3, March, 1994

               R. D. Banker and   
             R. J. Kauffman and   
                  C. Wright and   
                       D. Zweig   Automating output size and reuse metrics
                                  in a repository-based computer-aided
                                  software engineering (CASE) environment  169--187
              Yen-Min Huang and   
              C. V. Ravishankar   Designing an agent synthesis system for
                                  cross-RPC communication  . . . . . . . . 188--198
                      N. Fenton   Software measurement: a necessary
                                  scientific basis . . . . . . . . . . . . 199--206
                     F. Lustman   Specifying transaction-based information
                                  systems with regular expressions . . . . 207--217
                 W. G. Griswold   Comments on ``Language design for
                                  program manipulation'' . . . . . . . . . 218--219

IEEE Transactions on Software Engineering
Volume 20, Number 4, April, 1994

             R. L. Bagrodia and   
                   Wen-Toh Liao   Maisie: a language for the design of
                                  efficient discrete-event simulations . . 225--238
                G. C. Roman and   
                   C. D. Wilcox   Architecture-directed refinement . . . . 239--258
                   S. Antoy and   
                      J. Gannon   Using term rewriting to verify software  259--274
               J. E. Matson and   
              B. E. Barrett and   
               J. M. Mellichamp   Software development cost estimation
                                  using function points  . . . . . . . . . 275--287
                G. W. Ernst and   
              R. J. Hookway and   
                    W. F. Ogden   Modular verification of data
                                  abstractions with shared realizations    288--307
                      S. Vestal   Fixed-priority sensitivity analysis for
                                  linear compute time models . . . . . . . 308--317
                S. R. Dalal and   
                 A. A. McIntosh   When to stop testing for large software
                                  systems with changing code . . . . . . . 318--323

IEEE Transactions on Software Engineering
Volume 20, Number 5, May, 1994

                  M. Notomi and   
                      T. Murata   Hierarchical reachability graph of
                                  bounded Petri nets for
                                  concurrent-software analysis . . . . . . 325--336
               A. J. Offutt and   
                      S. D. Lee   An empirical evaluation of weak mutation 337--344
               N. Lopez-Benitez   Dependability modeling and analysis of
                                  distributed programs . . . . . . . . . . 345--352
                 E. Weyuker and   
                 T. Goradia and   
                       A. Singh   Automatically generating test data from
                                  a Boolean specification  . . . . . . . . 353--363
                Xiping Song and   
                L. J. Osterweil   Experience with an approach to comparing
                                  software design methodologies  . . . . . 364--384
                H. D. Pande and   
                W. A. Landi and   
                    B. G. Ryder   Interprocedural def-use associations for
                                  C systems with single level pointers . . 385--403

IEEE Transactions on Software Engineering
Volume 20, Number 6, June, 1994

                  V. Akella and   
              G. Gopalakrishnan   Specification and validation of
                                  control-intensive IC's in hopCP  . . . . 405--423
               N. R. Saxena and   
                E. J. McCluskey   Linear complexity assertions for sorting 424--431
                 P. Krueger and   
               N. G. Shivaratri   Adaptive location policies for global
                                  scheduling . . . . . . . . . . . . . . . 432--444
               W. E. Howden and   
                      B. Wieand   QDA --- a method for systematic informal
                                  program analysis . . . . . . . . . . . . 445--462
                    S. Paul and   
                     A. Prakash   A framework for source code search using
                                  program patterns . . . . . . . . . . . . 463--475
            S. R. Chidamber and   
                  C. F. Kemerer   A metrics suite for object oriented
                                  design . . . . . . . . . . . . . . . . . 476--493
                  C. Wohlin and   
                     P. Runeson   Certification of software components . . 494--499
                 M. Flatebo and   
                    A. K. Datta   Two-state self-stabilizing algorithms
                                  for token rings  . . . . . . . . . . . . 500--504

IEEE Transactions on Software Engineering
Volume 20, Number 7, July, 1994

                  G. Ciardo and   
                  R. German and   
                   C. Lindemann   A characterization of the stochastic
                                  process underlying a stochastic Petri
                                  net  . . . . . . . . . . . . . . . . . . 506--515
           G. Franceschinis and   
                    R. R. Muntz   Computing bounds for the performance
                                  indices of quasi-lumpable stochastic
                                  well-formed nets . . . . . . . . . . . . 516--525
                  J. Campos and   
                J. M. Colom and   
                H. Jungnitz and   
                       M. Silva   Approximate throughput computation of
                                  stochastic marked graphs . . . . . . . . 526--535
                R. J. Boucherie   A characterization of independence for
                                  competing Markov chains with
                                  applications to stochastic Petri nets    536--544

IEEE Transactions on Software Engineering
Volume 20, Number 8, August, 1994

           A. Coen-Porisini and   
             R. A. Kemmerer and   
                   D. Mandrioli   A formal framework for ASTRAL intralevel
                                  proof obligations  . . . . . . . . . . . 548--561
              D. W. Bustard and   
               A. C. Winstanley   Making changes to formal specifications:
                                  requirements and an example  . . . . . . 562--568
       A. C. W. Finkelstein and   
                  D. Gabbay and   
                  A. Hunter and   
                  J. Kramer and   
                    B. Nuseibeh   Inconsistency handling in
                                  multiperspective specifications  . . . . 569--578
           Shing Chi Cheung and   
                      J. Kramer   Tractable dataflow analysis for
                                  distributed systems  . . . . . . . . . . 579--593
                     A. Aue and   
                        M. Breu   Distributed information systems: an
                                  advanced methodology . . . . . . . . . . 594--605
                F. De Paoli and   
                      F. Tisato   CSDL: a language for cooperative systems
                                  design . . . . . . . . . . . . . . . . . 606--616
               W. B. Frakes and   
                     T. P. Pole   An empirical study of representation
                                  methods for reusable software components 617--630
                B. W. Weide and   
              S. H. Edwards and   
                D. E. Harms and   
                     D. A. Lamb   Design and specification of iterators
                                  using the swapping paradigm  . . . . . . 631--643
               J. M. Bieman and   
                      L. M. Ott   Measuring functional cohesion  . . . . . 644--657
               Ing-Ray Chen and   
                  F. B. Bastani   Warm standby in hierarchically
                                  structured process-control programs  . . 658--663
                     S. Stoller   Addendum to ``Proof rules for flush
                                  channels'' . . . . . . . . . . . . . . . 664

IEEE Transactions on Software Engineering
Volume 20, Number 9, September, 1994

              S. Weerahandi and   
                  R. E. Hausman   Software quality measurement based on
                                  fault-detection data . . . . . . . . . . 665--676
             S. Campodonico and   
             N. D. Singpurwalla   A Bayesian analysis of the
                                  logarithmic--Poisson execution time
                                  model based on expert opinion and
                                  failure data . . . . . . . . . . . . . . 677--683
              N. G. Leveson and   
          M. P. E. Heimdahl and   
                H. Hildreth and   
                    J. D. Reese   Requirements specification for
                                  process-control systems  . . . . . . . . 684--707
              G. S. Avrunin and   
              J. C. Corbett and   
               L. K. Dillon and   
                  J. C. Wileden   Automated derivation of time bounds in
                                  uniprocessor concurrent systems  . . . . 708--719
                   M. Tucci and   
                G. Vitiello and   
                 G. Costagliola   Parsing nonlinear languages  . . . . . . 720--739
                  K. Kanoun and   
                   J. C. Laprie   Software reliability trend analyses from
                                  theoretical to practical considerations  740--747

IEEE Transactions on Software Engineering
Volume 20, Number 10, October, 1994

                  Yabo Wang and   
                   D. L. Parnas   Simulating the behavior of software
                                  modules by trace rewriting . . . . . . . 750--759
                B. Nuseibeh and   
                  J. Kramer and   
                 A. Finkelstein   A framework for expressing the
                                  relationships between multiple views in
                                  requirements specification . . . . . . . 760--773
               M. G. Bradac and   
                D. E. Perry and   
                    L. G. Votta   Prototyping a process monitoring
                                  experiment . . . . . . . . . . . . . . . 774--784
                  L. Hatton and   
                     A. Roberts   How accurate is scientific software? . . 785--797
               D. L. Kiskis and   
                     K. G. Shin   SWSL: a synthetic workload specification
                                  language for real-time systems . . . . . 798--811
            J. A. Whittaker and   
                 M. G. Thomason   A Markov chain model for statistical
                                  software testing . . . . . . . . . . . . 812--824

IEEE Transactions on Software Engineering
Volume 20, Number 11, November, 1994

                 H. Lichter and   
    M. Schneider-Hufschmidt and   
                 H. Zullighoven   Prototyping in industrial software
                                  projects-bridging the gap between theory
                                  and practice . . . . . . . . . . . . . . 825--832
                H. Wohlwend and   
                   S. Rosenbaum   Schlumberger's software improvement
                                  program  . . . . . . . . . . . . . . . . 833--839
              H. H. Deubler and   
                    M. Koestler   Introducing object orientation into
                                  large and complex systems  . . . . . . . 840--848
                 S. Honiden and   
               K. Nishimura and   
                N. Uchihira and   
                        K. Itoh   An application of artificial
                                  intelligence to object-oriented
                                  performance design for real-time systems 849--867
              D. A. Menasce and   
                   Y. Yesha and   
                    K. Kalpakis   On a unified framework for the
                                  evaluation of distributed quorum
                                  attainment protocols . . . . . . . . . . 868--884

IEEE Transactions on Software Engineering
Volume 20, Number 12, December, 1994

               A. Bertolino and   
                       M. Marre   Automatic generation of path covers
                                  based on the control flow analysis of
                                  computer programs  . . . . . . . . . . . 885--899
                    M. Diaz and   
                 G. Juanole and   
                 J. P. Courtiat   Observer --- a concept for formal
                                  on-line validation of distributed
                                  systems  . . . . . . . . . . . . . . . . 900--913
                   Ying Liu and   
                A. K. Singh and   
                 R. L. Bagrodia   A decompositional approach to the design
                                  of parallel programs . . . . . . . . . . 914--932
                F. Jahanian and   
                      A. K. Mok   Modechart: a specification language for
                                  real-time systems  . . . . . . . . . . . 933--947
            D. Lorge Parnas and   
                   J. Madey and   
                    M. Iglewski   Precise documentation of well-structured
                                  programs . . . . . . . . . . . . . . . . 948--976
                 T. Y. Chen and   
                       Y. T. Yu   On the relationship between partition
                                  and random testing . . . . . . . . . . . 977--980


IEEE Transactions on Software Engineering
Volume 21, Number 1, January, 1995

           P. Triantafillou and   
                   D. J. Taylor   The location-based paradigm for
                                  replication: Achieving efficiency and
                                  availability in distributed systems  . . 1--18
                D. S. Rosenblum   A practical approach to programming with
                                  assertions . . . . . . . . . . . . . . . 19--31
              J. J. P. Tsai and   
            S. Jennhwa Yang and   
               Yao-Hsiung Chang   Timing constraint Petri nets and their
                                  application to schedulability analysis
                                  of real-time system specifications . . . 32--49
                  S. Hariri and   
                       H. Mutlu   Hierarchical modeling of availability in
                                  distributed systems  . . . . . . . . . . 50--56

IEEE Transactions on Software Engineering
Volume 21, Number 2, February, 1995

                     A. Boswell   Specification and validation of a
                                  security policy model  . . . . . . . . . 63--68
                     G. Barrett   Model checking in practice: the T9000
                                  virtual channel processor  . . . . . . . 69--78
              J. Bicarregui and   
                     B. Ritchie   Invariants, frames and postconditions: a
                                  comparison of the VDM and B notations    79--89
                 D. Craigen and   
                 S. Gerhart and   
                     T. Ralston   Formal methods reality check: industrial
                                  usage  . . . . . . . . . . . . . . . . . 90--98
                       J. Jacky   Specifying a safety-critical control
                                  system in Z  . . . . . . . . . . . . . . 99--106
                    S. Owre and   
                  J. Rushby and   
                 N. Shankar and   
                   F. von Henke   Formal verification for fault-tolerant
                                  architectures: prolegomena to the design
                                  of PVS . . . . . . . . . . . . . . . . . 107--125
              K. Srinivasan and   
                      D. Fisher   Machine learning approaches to
                                  estimating software development effort   126--137
                    K. Osterbye   Literate Smalltalk programming using
                                  hypertext  . . . . . . . . . . . . . . . 138--145
                   R. G. Dromey   A model for software product quality . . 146--162
              S. Venkatesan and   
                      B. Dathan   Testing and debugging distributed
                                  programs using global predicates . . . . 163--177

IEEE Transactions on Software Engineering
Volume 21, Number 3, March, 1995

                   K. Ilgun and   
             R. A. Kemmerer and   
                   P. A. Porras   State transition analysis: a rule-based
                                  intrusion detection approach . . . . . . 181--199
               S. H. Zweben and   
              S. H. Edwards and   
                B. W. Weide and   
            J. E. Hollingsworth   The effects of layering and
                                  encapsulation on software development
                                  cost and quality . . . . . . . . . . . . 200--208
                     T. Johnson   Approximate analysis of reader/writer
                                  queues . . . . . . . . . . . . . . . . . 209--218
                  W. J. Gutjahr   Optimal test distributions for software
                                  failure cost estimation  . . . . . . . . 219--228
                D. D. Cowan and   
                C. J. P. Lucena   Abstract data views: an interface
                                  specification concept to enhance design
                                  for reuse  . . . . . . . . . . . . . . . 229--243
                  S. Vranes and   
                  M. Stanojevic   Integrating multiple paradigms within
                                  the blackboard framework . . . . . . . . 244--262
             N. I. Churcher and   
             M. J. Shepperd and   
               S. Chidamber and   
                  C. F. Kemerer   Comments on ``A metrics suite for object
                                  oriented design''  . . . . . . . . . . . 263--265

IEEE Transactions on Software Engineering
Volume 21, Number 4, April, 1995

             W. G. Griswold and   
                      D. Notkin   Architectural tradeoffs for a
                                  meaning-preserving program restructuring
                                  tool . . . . . . . . . . . . . . . . . . 275--287
              B. Hayes-Roth and   
                 K. Pfleger and   
                 P. Lalanda and   
                P. Morignot and   
                 M. Balabanovic   A domain-specific software architecture
                                  for adaptive intelligent systems . . . . 288--301
                 T. R. Dean and   
                    J. R. Cordy   A syntactic theory of software
                                  architecture . . . . . . . . . . . . . . 302--313
                  Mary Shaw and   
              Robert DeLine and   
            Daniel V. Klein and   
           Theodore L. Ross and   
             David M. Young and   
               Gregory Zelesnik   Abstractions for software architecture
                                  and tools to support them  . . . . . . . 314--335
              D. C. Luckham and   
               J. J. Kenney and   
             L. M. Augustin and   
                    J. Vera and   
                   D. Bryan and   
                        W. Mann   Specification and analysis of system
                                  architecture using Rapide  . . . . . . . 336--354
                M. Moriconi and   
                    X. Qian and   
          R. A. Riemenschneider   Correct architecture refinement  . . . . 356--372
               P. Inverardi and   
                     A. L. Wolf   Formal specification and analysis of
                                  software architectures using the
                                  chemical abstract machine model  . . . . 373--386

IEEE Transactions on Software Engineering
Volume 21, Number 5, May, 1995

                  R. Gerber and   
                  Seongsoo Hong   Compiling real-time programs with timing
                                  constraint refinement and structural
                                  code motion  . . . . . . . . . . . . . . 389--404
                    J. Tian and   
                    Peng Lu and   
                       J. Palma   Test-execution-based reliability
                                  measurement and modeling for large
                                  commercial software  . . . . . . . . . . 405--414
                      F. Ng and   
                  G. Butler and   
                       Judy Kay   An intelligent tutoring system for the
                                  Dijkstra--Gries methodology  . . . . . . 415--428
                   S. Dolev and   
                 A. Israeli and   
                       S. Moran   Analyzing expected time by
                                  scheduler-luck games . . . . . . . . . . 429--439
              S. Bandinelli and   
                A. Fuggetta and   
                 L. Lavazza and   
                     M. Loi and   
                    G. P. Picco   Modeling and improving an industrial
                                  software process . . . . . . . . . . . . 440--454
                 Inhwan Lee and   
                     R. K. Iyer   Software dependability in the Tandem
                                  GUARDIAN system  . . . . . . . . . . . . 455--467
               M. G. Sriram and   
                     M. Singhal   Measures of the potential for load
                                  sharing in distributed computing systems 468--475
                   A. Burns and   
                 K. Tindell and   
                    A. Wellings   Effective analysis for engineering
                                  real-time fixed priority schedulers  . . 475--480

IEEE Transactions on Software Engineering
Volume 21, Number 6, June, 1995

                     R. J. Hall   Call path refinement profiles  . . . . . 481--496
             M. Spezialetti and   
                       R. Gupta   Loop monotonic statements  . . . . . . . 497--505
                  A. M. Stavely   Verifying definite iteration over data
                                  structures . . . . . . . . . . . . . . . 506--514
                    T. Kunz and   
                    J. P. Black   Using automatic process clustering for
                                  design recovery and distributed
                                  debugging  . . . . . . . . . . . . . . . 515--527
                    H. Mili and   
                    F. Mili and   
                        A. Mili   Reusing software: issues and research
                                  directions . . . . . . . . . . . . . . . 528--562
               A. A. Porter and   
                L. G. Votta and   
                   V. R. Basili   Comparing detection methods for software
                                  requirements inspections: a replicated
                                  experiment . . . . . . . . . . . . . . . 563--575

IEEE Transactions on Software Engineering
Volume 21, Number 7, July, 1995

                  R. Gerber and   
              Seongsoo Hong and   
                     M. Saksena   Guaranteeing real-time requirements with
                                  resource-based calibration of periodic
                                  processes  . . . . . . . . . . . . . . . 579--592
               Sung-Soo Lim and   
             Young Hyun Bae and   
               Gyu Tae Jang and   
              Byung-Do Rhee and   
              Sang Lyul Min and   
             Chang Yun Park and   
              Heonshik Shin and   
                Kunsoo Park and   
              Soo-Mook Moon and   
                 Chong Sang Kim   An accurate worst case timing analysis
                                  for RISC processors  . . . . . . . . . . 593--604
               Rwo-Hsi Wang and   
                      A. K. Mok   Response-time bounds of EQL rule-based
                                  programs under rule priority structure   605--614
             R. H. Saavedra and   
                    A. J. Smith   Performance characterization of
                                  optimizing compilers . . . . . . . . . . 615--628
              A. M. Tyrrell and   
                G. F. Carpenter   CSP methods for identifying atomic
                                  actions in the design of fault tolerant
                                  concurrent systems . . . . . . . . . . . 629--639

IEEE Transactions on Software Engineering
Volume 21, Number 8, August, 1995

                    J. Tian and   
                M. V. Zelkowitz   Complexity measure evaluation and
                                  selection  . . . . . . . . . . . . . . . 641--650
                    G. S. Novak   Conversion of units of measurement . . . 651--661
              P. Bertolazzi and   
             G. Di Battista and   
                      G. Liotta   Parametric graph drawing . . . . . . . . 662--673
                   M. Jorgensen   Experience with the accuracy of software
                                  maintenance task effort prediction
                                  models . . . . . . . . . . . . . . . . . 674--681
                    H. Levy and   
                R. J. T. Morris   Exact analysis of Bernoulli
                                  superposition of streams into a least
                                  recently used cache  . . . . . . . . . . 682--688
                J. A. Rolia and   
                   K. C. Sevcik   The Method of Layers . . . . . . . . . . 689--700
                      H. Sarper   No special schemes are needed for
                                  solving software reliability
                                  optimization models  . . . . . . . . . . 701--702

IEEE Transactions on Software Engineering
Volume 21, Number 9, September, 1995

                A. Avritzer and   
                  E. R. Weyuker   The automatic generation of load test
                                  suites and the assessment of the
                                  resulting software . . . . . . . . . . . 705--716
              D. C. Luckham and   
                        J. Vera   An event-based architecture definition
                                  language . . . . . . . . . . . . . . . . 717--734
              K. J. Goldman and   
             B. Swaminathan and   
               P. McCartney and   
             M. D. Anderson and   
                  R. Sethuraman   The Programmers' Playground: I/O
                                  abstraction for user-configurable
                                  distributed applications . . . . . . . . 735--746
               J. H. R. May and   
                     A. D. Lunn   A model of code sharing for estimating
                                  software failure on demand probabilities 747--753
                 C. M. Woodside   A three-view model for performance
                                  engineering of concurrent software . . . 754--767
                     L. Lamport   TLA in pictures  . . . . . . . . . . . . 768--775
              J. E. Neilson and   
             C. M. Woodside and   
               D. C. Petriu and   
                    S. Majumdar   Software bottlenecking in client-server
                                  systems and rendezvous networks  . . . . 776--782

IEEE Transactions on Software Engineering
Volume 21, Number 10, October, 1995

                 A. Borgida and   
              J. Mylopoulos and   
                      R. Reiter   On the frame problem in procedure
                                  specifications . . . . . . . . . . . . . 785--798
             R. H. Bourdeau and   
                 B. H. C. Cheng   A formal semantics for object model
                                  diagrams . . . . . . . . . . . . . . . . 799--821
                 M. Aagaard and   
                      M. Leeser   Verifying a logic-synthesis algorithm
                                  and implementation: a case study in
                                  software verification  . . . . . . . . . 822--833
                V. B. Lortz and   
                     K. G. Shin   Semaphore queue priority assignment for
                                  real-time multiprocessor synchronization 834--844
           B. Krishnamurthy and   
                D. S. Rosenblum   Yeast: a general purpose event-action
                                  system . . . . . . . . . . . . . . . . . 845--857
              R. A. DeMillo and   
               A. P. Mathur and   
                 W. E. Wong and   
               P. G. Frankl and   
                  E. J. Weyuker   Some critical remarks on a hierarchy of
                                  fault-detecting abilities of test
                                  methods [and reply]  . . . . . . . . . . 858--863

IEEE Transactions on Software Engineering
Volume 21, Number 11, November, 1995

               S. Cavalieri and   
              A. Di Stefano and   
                   O. Mirabella   Pre-run-time scheduling to reduce
                                  schedule length in the FieldBus
                                  environment  . . . . . . . . . . . . . . 865--880
                  A. H. Lee and   
                  J. L. Zachary   Reflections on metaprogramming . . . . . 883--893
                 D. A. Ladd and   
                  J. C. Ramming   A*: a language for implementing language
                                  processors . . . . . . . . . . . . . . . 894--901
               K. Yasumatsu and   
                         N. Doi   SPiCE: a system for translating
                                  Smalltalk programs into a C environment  902--912
              Yong-Fong Lee and   
                B. G. Ryder and   
               M. E. Fiuczynski   Region analysis: a parallel elimination
                                  method for data flow analysis  . . . . . 913--926

IEEE Transactions on Software Engineering
Volume 21, Number 12, December, 1995

                      Anonymous   1995 Index \booktitleIEEE Transactions
                                  on Software Engineering Vol. 21  . . . . 1
              B. Kitchenham and   
       S. Lawrence Pfleeger and   
                      N. Fenton   Towards a framework for software
                                  measurement validation . . . . . . . . . 929--944
                        J. Tian   Integrating time domain and input domain
                                  analyses of software reliability using
                                  tree-based models  . . . . . . . . . . . 945--958
                  Jia Liang Han   Program partition and logic program
                                  analysis . . . . . . . . . . . . . . . . 959--968
                   G. Bucci and   
                     E. Vicario   Compositional validation of
                                  time-critical systems using
                                  communicating time Petri nets  . . . . . 969--992
                    G. S. Novak   Creation of views for reuse of software
                                  with different data representations  . . 993--1005
              A. S. Parrish and   
                   S. H. Zweben   On the relationships among the all-uses,
                                  all-DU-paths, and all-edges testing
                                  criteria . . . . . . . . . . . . . . . . 1006--1009
                     P. Devanbu   On ``A framework for source code search
                                  using program patterns'' . . . . . . . . 1009--1010


IEEE Transactions on Software Engineering
Volume 22, Number 1, January, 1996

                      J. McHugh   Introduction to the Special Section  . . 3
                   M. Abadi and   
                     R. Needham   Prudent engineering practice for
                                  cryptographic protocols  . . . . . . . . 6--15
                 N. Heintze and   
                    J. D. Tygar   A model for secure protocols and their
                                  compositions . . . . . . . . . . . . . . 16--30
                   M. K. Reiter   A secure group membership protocol . . . 31--42
                    Li Gong and   
                   Xiaolei Qian   Computational issues in secure
                                  interoperation . . . . . . . . . . . . . 43--52
                      J. McLean   A general theory of composition for a
                                  class of ``possibilistic'' properties    53--67
               L. C. Briand and   
                 S. Morasca and   
                   V. R. Basili   Property-based software engineering
                                  measurement  . . . . . . . . . . . . . . 68--86

IEEE Transactions on Software Engineering
Volume 22, Number 2, February, 1996

               A. Bertolino and   
                    L. Strigini   On the use of testability measures for
                                  dependability assessment . . . . . . . . 97--108
                 T. Y. Chen and   
                       Y. T. Yu   On the expected number of failures
                                  detected by subdomain testing and random
                                  testing  . . . . . . . . . . . . . . . . 109--119
                   D. Gupta and   
                  P. Jalote and   
                       G. Barua   A formal framework for on-line software
                                  version change . . . . . . . . . . . . . 120--131
               C. Clemencon and   
               B. Mukherjee and   
                      K. Schwan   Distributed shared abstractions (DSA) on
                                  multiprocessors  . . . . . . . . . . . . 132--152
                 V. Rajlich and   
                    J. H. Silva   Evolution and reuse of orthogonal
                                  architecture . . . . . . . . . . . . . . 153--157
                      K. Finney   Mathematical notation in formal
                                  specification: too difficult for the
                                  masses?  . . . . . . . . . . . . . . . . 158--159

IEEE Transactions on Software Engineering
Volume 22, Number 3, March, 1996

                  J. C. Corbett   Evaluating deadlock detection methods
                                  for concurrent software  . . . . . . . . 161--180
                    R. Alur and   
            T. A. Henzinger and   
                    Pei-Hsin Ho   Automatic symbolic verification of
                                  embedded systems . . . . . . . . . . . . 181--201
                    S. Paul and   
                     A. Prakash   A query algebra for program databases    202--217
               Sanping Chen and   
                       S. Mills   A binary Markov process model for random
                                  testing  . . . . . . . . . . . . . . . . 218--223

IEEE Transactions on Software Engineering
Volume 22, Number 4, April, 1996

               C. D. Wilcox and   
                    G. C. Roman   Reasoning about places, times, and
                                  actions in the presence of mobility  . . 225--247
                       Hong Zhu   A formal analysis of the subsume
                                  relation between software test adequacy
                                  criteria . . . . . . . . . . . . . . . . 248--255
               F. Boussinot and   
                   R. de Simone   The SL synchronous language  . . . . . . 256--266
                    M. Hitz and   
                   B. Montazeri   Chidamber and Kemerer's metrics suite: a
                                  measurement theory perspective . . . . . 267--271
                   Lin Lin Wang   Thorough investigation into ``An
                                  improved algorithm based on subset
                                  closures for synthesizing a relational
                                  database scheme''  . . . . . . . . . . . 271--274
               W. B. Frakes and   
                      C. J. Fox   Quality improvement using a software
                                  reuse failure modes model  . . . . . . . 274--279

IEEE Transactions on Software Engineering
Volume 22, Number 5, May, 1996

                     C. Meadows   Guest Editorial: Introduction to the
                                  Special Section  . . . . . . . . . . . . 281
                  O. Sibert and   
               P. A. Porras and   
                     R. Lindell   An analysis of the Intel 80x86 security
                                  architecture and implementations . . . . 283--293
             R. J. Anderson and   
            S. J. Bezuidenhoudt   On the reliability of electronic payment
                                  systems  . . . . . . . . . . . . . . . . 294--301
             M. K. Franklin and   
                   M. K. Reiter   The design and implementation of a
                                  secure auction service . . . . . . . . . 302--312
                      R. Kailar   Accountability in electronic commerce
                                  protocols  . . . . . . . . . . . . . . . 313--328
                 M. H. Kang and   
            I. S. Moskowitz and   
                      D. C. Lee   A network pump . . . . . . . . . . . . . 329--338
         S. K. Abd-El-Hafiz and   
                   V. R. Basili   A knowledge-based approach to the
                                  analysis of loops  . . . . . . . . . . . 339--360

IEEE Transactions on Software Engineering
Volume 22, Number 6, June, 1996

                  D. Notkin and   
                  D. R. Jeffery   Guest Editorial: Introduction to the
                                  Special Section  . . . . . . . . . . . . 361
          M. P. E. Heimdahl and   
                  N. G. Leveson   Completeness and consistency in
                                  hierarchical state-based requirements    363--377
                M. A. Ardis and   
               J. A. Chaves and   
           L. J. Jagadeesan and   
                  P. Mataga and   
                  C. Puchol and   
          M. G. Staskauskas and   
               J. Von Olnhausen   A framework for evaluating specification
                                  methods for reactive systems-experience
                                  report . . . . . . . . . . . . . . . . . 378--389
               R. N. Taylor and   
              N. Medvidovic and   
             K. M. Anderson and   
            E. J. Whitehead and   
              J. E. Robbins and   
                 K. A. Nies and   
                  P. Oreizy and   
                   D. L. Dubrow   A component- and message-based
                                  architectural style for GUI software . . 390--406
               T. Isakowitz and   
                 R. J. Kauffman   Supporting search for reusable software
                                  objects  . . . . . . . . . . . . . . . . 407--423
          A. Von Mayrhauser and   
                     A. M. Vans   Identification of dynamic comprehension
                                  processes during large scale maintenance 424--437

IEEE Transactions on Software Engineering
Volume 22, Number 7, July, 1996

              M. J. Harrold and   
                   G. Rothermel   Separate computation of alias
                                  information for reuse  . . . . . . . . . 442--460
                  J. C. Corbett   Timing analysis of Ada tasking programs  461--483
                 D. Jackson and   
                    C. A. Damon   Elements of style: analyzing a software
                                  design feature with a counterexample
                                  detector . . . . . . . . . . . . . . . . 484--495
               P. Godefroid and   
                   D. Peled and   
                 M. Staskauskas   Using partial-order methods in the
                                  formal validation of industrial
                                  concurrent programs  . . . . . . . . . . 496--507
                    P. Zave and   
                     M. Jackson   Where do operations come from? A
                                  multiparadigm specification technique    508--528

IEEE Transactions on Software Engineering
Volume 22, Number 8, August, 1996

               G. Rothermel and   
                  M. J. Harrold   Analyzing regression test selection
                                  techniques . . . . . . . . . . . . . . . 529--551
                  Kuo-Chung Tai   Theory of fault-based predicate testing
                                  for computer programs  . . . . . . . . . 552--562
             K. J. Sullivan and   
                I. J. Kalet and   
                      D. Notkin   Evaluating the mediator method: Prism as
                                  a case study . . . . . . . . . . . . . . 563--579
                Taizan Chan and   
            Siu Leung Chung and   
                    Teck Hua Ho   An economic model to estimate software
                                  rewriting and replacement times  . . . . 580--598
                      Anonymous   Reference Model for Smooth Growth of
                                  Software Systems (003)5402022  . . . . . 

IEEE Transactions on Software Engineering
Volume 22, Number 9, September, 1996

                  G. Ciardo and   
                      C. Ghezzi   Guest Editorial: Introduction to the
                                  Special Section  . . . . . . . . . . . . 601
              M. A. Qureshi and   
              W. H. Sanders and   
       A. P. A. van Moorsel and   
                      R. German   Algorithms for the generation of
                                  state-level representations of
                                  stochastic activity networks with
                                  general reward structures  . . . . . . . 603--614
                      P. Kemper   Numerical analysis of superposed GSPNs   615--628
                       R. Gaeta   Efficient discrete-event simulation of
                                  colored Petri nets . . . . . . . . . . . 629--639
                 V. Mainkar and   
                  K. S. Trivedi   Sufficient conditions for existence of a
                                  fixed point in stochastic reward
                                  net-based iterative models . . . . . . . 640--653
                      M. Sereno   Approximate mean value analysis for
                                  stochastic marked graphs . . . . . . . . 654--664
                        M. Ward   Derivation of data intensive algorithms
                                  by formal transformation: the
                                  Schnorr--Waite graph marking algorithm   665--686
                       T. Adams   Total variance approach to software
                                  reliability estimation . . . . . . . . . 687--688

IEEE Transactions on Software Engineering
Volume 22, Number 10, October, 1996

               E. Battiston and   
               F. De Cindio and   
                       G. Mauri   Modular algebraic nets to specify
                                  concurrent systems . . . . . . . . . . . 689--705
              K. D. Maxwell and   
          L. Van Wassenhove and   
                       S. Dutta   Software development productivity of
                                  European space, military, and industrial
                                  applications . . . . . . . . . . . . . . 706--718
              N. J. Puketza and   
                   K. Zhang and   
                   M. Chung and   
               B. Mukherjee and   
                   R. A. Olsson   A methodology for testing intrusion
                                  detection systems  . . . . . . . . . . . 719--729
                F. Ferrucci and   
                 G. Tortora and   
                   M. Tucci and   
                    G. Vitiello   Semantics-based inference algorithms for
                                  adaptive visual environments . . . . . . 730--750
               V. R. Basili and   
               L. C. Briand and   
                     W. L. Melo   A validation of object-oriented design
                                  metrics as quality indicators  . . . . . 751--761
                   F. W. Burton   Guaranteeing good memory bounds for
                                  parallel programs  . . . . . . . . . . . 762--773

IEEE Transactions on Software Engineering
Volume 22, Number 11, November, 1996

                  P. Stocks and   
                  D. Carrington   A framework for specification-based
                                  testing  . . . . . . . . . . . . . . . . 777--793
                M. B. Dwyer and   
                   L. A. Clarke   A compact Petri net representation and
                                  its implications for analysis  . . . . . 794--811
               P. Triantafillou   Independent recovery in large-scale
                                  distributed systems  . . . . . . . . . . 812--826
                    H. Levy and   
            T. G. Messinger and   
                R. J. T. Morris   The cache assignment problem and its
                                  application to database buffer
                                  management . . . . . . . . . . . . . . . 827--838

IEEE Transactions on Software Engineering
Volume 22, Number 12, December, 1996

              S. Bandinelli and   
                E. Di Nitto and   
                    A. Fuggetta   Supporting cooperation in the SPADE-1
                                  environment  . . . . . . . . . . . . . . 841--865
                     Y. Chernak   A statistical approach to the inspection
                                  checklist formal synthesis and
                                  improvement  . . . . . . . . . . . . . . 866--874
            J. D. Blackburn and   
              G. D. Scudder and   
           L. N. Van Wassenhove   Improving speed and productivity of
                                  software development: a global survey of
                                  software developers  . . . . . . . . . . 875--885
                 N. Ohlsson and   
                      H. Alberg   Predicting fault-prone software modules
                                  in telephone switches  . . . . . . . . . 886--894
                   A. Abran and   
                P. N. Robillard   Function points analysis: an empirical
                                  study of its measurement processes . . . 895--910
             R. H. Bourdeau and   
                 B. H. C. Cheng   Correspondence: Response to Botting's
                                  Comments . . . . . . . . . . . . . . . . 911--911
              R. J. Botting and   
             R. H. Bourdeau and   
                 B. H. C. Cheng   Comments on ``A formal semantics for
                                  object model diagrams''  . . . . . . . . 911
                      Anonymous   1996 Index \booktitleIEEE Transactions
                                  on Software vol. 22  . . . . . . . . . . 912--919


IEEE Transactions on Software Engineering
Volume 23, Number 1, January, 1997

                   Yong Yan and   
             Xiaodong Zhang and   
                        Qian Ma   Software support for multiprocessor
                                  latency measurement and evaluation . . . 4--16
                       B. Korel   Computation of dynamic program slices
                                  for unstructured programs  . . . . . . . 17--34
           P. Triantafillou and   
                     C. Neilson   Achieving strong consistency in a
                                  distributed file system  . . . . . . . . 35--55
            R. J. Hilderman and   
                 H. J. Hamilton   A note on regeneration with virtual
                                  copies . . . . . . . . . . . . . . . . . 56--59
                      Anonymous   Author index . . . . . . . . . . . . . . 60--61

IEEE Transactions on Software Engineering
Volume 23, Number 2, February, 1997

                      Anonymous   Guest Editorial: Introduction to the
                                  Special Section  . . . . . . . . . . . . 65--66
                  D. Batory and   
                   B. J. Geraci   Composition validation and subjectivity
                                  in GenVoca generators  . . . . . . . . . 67--82
                  S. H. Edwards   Representation inheritance: a safe form
                                  of ``White box'' code inheritance  . . . 83--92
               Wu-Chun Feng and   
                   J. W. S. Liu   Algorithms for scheduling real-time
                                  tasks with input error and end-to-end
                                  deadlines  . . . . . . . . . . . . . . . 93--106
                A. Wellings and   
                       A. Burns   Implementing atomic actions in Ada 95    107--123

IEEE Transactions on Software Engineering
Volume 23, Number 3, March, 1997

               A. A. Porter and   
                  P. M. Johnson   Assessing software review meetings:
                                  results of a comparative analysis of two
                                  experimental studies . . . . . . . . . . 129--145
            D. S. Rosenblum and   
                  E. J. Weyuker   Using coverage information to predict
                                  the cost-effectiveness of regression
                                  testing strategies . . . . . . . . . . . 146--156
               M. Sitaraman and   
                B. W. Weide and   
                    W. F. Ogden   On the practical need for abstraction
                                  relations to verify abstract data type
                                  representations  . . . . . . . . . . . . 157--170
             Jen-Yen Jason Chen   CSPL: an Ada95-like, Unix-based process
                                  environment  . . . . . . . . . . . . . . 171--184
                       M. Abadi   Explicit communication revisited: two
                                  new attacks on authentication protocols  185--186
                 S. Morasca and   
               L. C. Briand and   
               V. R. Basili and   
              E. J. Weyuker and   
            M. V. Zelkowitz and   
              B. Kitchenham and   
       S. Lawrence Pfleeger and   
                      N. Fenton   Comments on ``Towards a framework for
                                  software measurement validation''  . . . 187--189
              B. Kitchenham and   
       S. Lawrence Pfleeger and   
                      N. Fenton   Reply To: Comments On ``Towards a
                                  Framework of Software Measurement
                                  Validation'' . . . . . . . . . . . . . . 189--189
                   G. Poels and   
                  G. Dedene and   
               L. C. Briand and   
                 S. Morasca and   
                   V. R. Basili   Comments on ``Property-based software
                                  engineering measurement: refining the
                                  additivity properties''  . . . . . . . . 190--197
               L. C. Briand and   
                 S. Morasca and   
                   V. R. Basili   Response To: Comments On
                                  ``Property-based Software Engineering
                                  Measurement: Refining The Additivity
                                  Properties'' . . . . . . . . . . . . . . 196--197

IEEE Transactions on Software Engineering
Volume 23, Number 4, April, 1997

                S. R. Faulk and   
                   C. Heitmeyer   Introduction to the Special Section  . . 201--202
                M. Kaufmann and   
                    J. S. Moore   An industrial strength theorem prover
                                  for a logic based on Common Lisp . . . . 203--213
                    W. D. Young   Comparing verification systems:
                                  interactive consistency in ACL2  . . . . 214--223
                   B. Bloom and   
                   A. Cheng and   
                      A. Dsouza   Using a Protean language to enhance
                                  expressiveness in specification  . . . . 224--234
                 E. Jonsson and   
                    T. Olovsson   A quantitative model of the security
                                  intrusion process based on attacker
                                  behavior . . . . . . . . . . . . . . . . 235--245
                F. Lanubile and   
                    G. Visaggio   Extracting reusable functions by flow
                                  graph based program slicing  . . . . . . 246--259
           B. Henderson-Sellers   Corrigenda: ``Software size estimation
                                  of object-oriented systems'' . . . . . . 260--261

IEEE Transactions on Software Engineering
Volume 23, Number 5, May, 1997

               L. K. Dillon and   
                      S. Sankar   Introduction to the special issue  . . . 265--266
                B. Dutertre and   
                   V. Stavridou   Formal requirements analysis of an
                                  avionics control system  . . . . . . . . 267--278
                 G. J. Holzmann   The model checker SPIN . . . . . . . . . 279--295
                S. Matsuura and   
                  H. Kuruma and   
                     S. Honiden   EVA: a flexible programming method for
                                  evolving systems . . . . . . . . . . . . 296--313
             Changqing Wang and   
                   D. R. Musser   Dynamic verification of C++ generic
                                  algorithms . . . . . . . . . . . . . . . 314--323

IEEE Transactions on Software Engineering
Volume 23, Number 6, June, 1997

               A. A. Porter and   
                  H. P. Siy and   
                C. A. Toman and   
                    L. G. Votta   An experiment to assess the
                                  cost-benefits of code inspections in
                                  large scale software development . . . . 329--346
                B. A. Myers and   
             R. G. McDaniel and   
               R. C. Miller and   
             A. S. Ferrency and   
                A. Faulring and   
                 B. D. Kyle and   
                 A. Mickish and   
             A. Klimovitski and   
                       P. Doane   The Amulet environment: new models for
                                  effective user interface software
                                  development  . . . . . . . . . . . . . . 347--365
               A. Mukherjee and   
                D. P. Siewiorek   Measuring software dependability by
                                  robustness benchmarking  . . . . . . . . 366--378
                        Qing Hu   Evaluating alternative software
                                  production functions . . . . . . . . . . 379--387
                  I. Ripoll and   
                  A. Crespo and   
               A. Garcia-Fornes   An optimal algorithm for scheduling soft
                                  aperiodic tasks in dynamic-priority
                                  preemptive systems . . . . . . . . . . . 388--400

IEEE Transactions on Software Engineering
Volume 23, Number 7, July, 1997

                    G. S. Novak   Software reuse by specialization of
                                  generic procedures through views . . . . 401--417
                         A. Sen   The role of opportunism in the software
                                  design reuse process . . . . . . . . . . 418--436
                D. M. Cohen and   
                S. R. Dalal and   
              M. L. Fredman and   
                   G. C. Patton   The AETG system: an approach to testing
                                  based on combinatorial design  . . . . . 437--444
                    R. Mili and   
                    A. Mili and   
               R. T. Mittermeir   Storing and retrieving software
                                  components: a refinement based system    445--460
           L. J. Holtzblatt and   
               R. L. Piazza and   
          H. B. Reubenstein and   
              S. N. Roberts and   
                   D. R. Harris   Design recovery for distributed systems  461--472

IEEE Transactions on Software Engineering
Volume 23, Number 8, August, 1997

            M. J. Gallagher and   
          V. Lakshmi Narasimhan   ADTEST: a test data generation suite for
                                  Ada software systems . . . . . . . . . . 473--484
                  K. Pillai and   
           V. S. Sukumaran Nair   A model for software development effort
                                  and cost estimation  . . . . . . . . . . 485--497
                     D. Binkley   Semantics guided regression test cost
                                  reduction  . . . . . . . . . . . . . . . 498--516
                   M. Y. Wu and   
                         W. Shu   On parallelization of static scheduling
                                  algorithms . . . . . . . . . . . . . . . 517--528
                 N. B. Ebrahimi   On the statistical analysis of the
                                  number of errors remaining in a software
                                  design document after inspection . . . . 529--532
                        H. Zuse   Reply to: ``Property-based software
                                  engineering measurement''  . . . . . . . 533

IEEE Transactions on Software Engineering
Volume 23, Number 9, September, 1997

               Nam-Yong Lee and   
                  C. R. Litecky   An empirical study of software reuse
                                  with special attention to Ada  . . . . . 537--549
                 R. Focardi and   
                    R. Gorrieri   The Compositional Security Checker: a
                                  tool for the verification of information
                                  flow security properties . . . . . . . . 550--571
           A. Coen-Porisini and   
                  C. Ghezzi and   
                 R. A. Kemmerer   Specification of realtime systems using
                                  ASTRAL . . . . . . . . . . . . . . . . . 572--598
           T. F. Abdelzaher and   
                     K. G. Shin   Comment on ``A pre-run-time scheduling
                                  algorithm for hard real-time systems''   599--600

IEEE Transactions on Software Engineering
Volume 23, Number 10, October, 1997

                      Anonymous   Real-time Systems Symposium (RTSS'96)    0:1--0:1
                    Sang H. Son   Guest Editorial: Introduction to the
                                  Special Section  . . . . . . . . . . . . 601--602
                     J. Sun and   
              M. K. Gardner and   
                   J. W. S. Liu   Bounding completion times of jobs with
                                  arbitrary release times, variable
                                  execution times and resource sharing . . 603--615
                   A. Mehra and   
               A. Indiresan and   
                     K. G. Shin   Structuring communication software for
                                  quality-of-service guarantees  . . . . . 616--634
                  A. K. Mok and   
                        D. Chen   A multiframe model for real-time tasks   635--645
                   K. Audenaert   Clock trees: logical clocks for programs
                                  with nested parallelism  . . . . . . . . 646--658
                    G. Lowe and   
                      B. Roscoe   Using CSP to detect errors in the TMN
                                  protocol . . . . . . . . . . . . . . . . 659--669

IEEE Transactions on Software Engineering
Volume 23, Number 11, November, 1997

              B. Littlewood and   
                      D. Wright   Some conservative stopping rules for the
                                  operational testing of safety critical
                                  software . . . . . . . . . . . . . . . . 673--683
               C. J. Walter and   
                 P. Lincoln and   
                        N. Suri   Formally verified on-line diagnosis  . . 684--721
                 R. Mahajan and   
                 B. Shneiderman   Visual and textual consistency checking
                                  tools for graphical user interfaces  . . 722--735
                M. Shepperd and   
                   C. Schofield   Estimating software project effort using
                                  analogies  . . . . . . . . . . . . . . . 736--743

IEEE Transactions on Software Engineering
Volume 23, Number 12, December, 1997

              Dar-Tzen Peng and   
                 K. G. Shin and   
               T. F. Abdelzaher   Assignment and scheduling communicating
                                  periodic tasks in distributed real-time
                                  systems  . . . . . . . . . . . . . . . . 745--758
              D. B. Stewart and   
                R. A. Volpe and   
                   P. K. Khosla   Design of dynamically reconfigurable
                                  real-time software using port-based
                                  objects  . . . . . . . . . . . . . . . . 759--776
             G. Costagliola and   
                A. De Lucia and   
                 S. Orefice and   
                     G. Tortora   A parsing methodology for the
                                  implementation of visual systems . . . . 777--799
                      Anonymous   1997 Index \booktitleIEEE Transactions
                                  on Software Vol. 23  . . . . . . . . . . 800--807


IEEE Transactions on Software Engineering
Volume 24, Number 1, January, 1998

             S. Easterbrook and   
                    R. Lutz and   
               R. Covington and   
                   J. Kelly and   
                    Y. Ampo and   
                    D. Hamilton   Experiences using lightweight formal
                                  methods for requirements modeling  . . . 4--14
                    M. Neil and   
               G. Ostrolenk and   
                   M. Tobin and   
                  M. Southworth   Lessons from using Z to specify a
                                  software tool  . . . . . . . . . . . . . 15--23
               Shaoying Liu and   
               A. J. Offutt and   
               C. Ho-Stuart and   
                     Y. Sun and   
                        M. Ohba   SOFL: a formal engineering methodology
                                  for industrial applications  . . . . . . 24--45
                     B. Chetali   Formal verification of concurrent
                                  programs using the Larch prover  . . . . 46--62
                   A. Arora and   
                 S. S. Kulkarni   Component based design of multitolerant
                                  systems  . . . . . . . . . . . . . . . . 63--78
               L. M. Seiter and   
                J. Palsberg and   
               K. J. Lieberherr   Evolution of object behavior using
                                  context relations  . . . . . . . . . . . 79--92
                      Anonymous   Author index . . . . . . . . . . . . . . 93--95

IEEE Transactions on Software Engineering
Volume 24, Number 2, February, 1998

               P. J. McCann and   
                    G. C. Roman   Compositional programming abstractions
                                  for mobile computing . . . . . . . . . . 97--110
               J. M. Bieman and   
                Byung-Kyoo Kang   Measuring design-level cohesion  . . . . 111--124
                J. Carreira and   
                 H. Madeira and   
                    J. G. Silva   Xception: a technique for the
                                  experimental evaluation of dependability
                                  in modern computers  . . . . . . . . . . 125--136
              A. L. Lederer and   
                      J. Prasad   A causal model for software cost
                                  estimating error . . . . . . . . . . . . 137--148
                  L. Alvisi and   
                    K. Marzullo   Message logging: pessimistic,
                                  optimistic, causal, and optimal  . . . . 149--159

IEEE Transactions on Software Engineering
Volume 24, Number 3, March, 1998

               D. K. Peters and   
                   D. L. Parnas   Using test oracles generated from
                                  program documentation  . . . . . . . . . 161--173
               A. Sutcliffe and   
                      N. Maiden   The domain theory for requirements
                                  engineering  . . . . . . . . . . . . . . 174--196
                    S. Jarzabek   Design of flexible static program
                                  analyzers with PQL . . . . . . . . . . . 197--215
                  A. Sowmya and   
                      S. Ramesh   Extending statecharts with temporal
                                  logic  . . . . . . . . . . . . . . . . . 216--231

IEEE Transactions on Software Engineering
Volume 24, Number 4, April, 1998

                  M. Snoeck and   
                      G. Dedene   Existence dependency: The key to
                                  semantic integrity between structural
                                  and behavioral aspects of object types   233--251
                Y. M. Huang and   
              C. V. Ravishankar   Constructive protocol specification
                                  using Cicero . . . . . . . . . . . . . . 252--267
                S. McLellan and   
                 A. Roesler and   
                     Z. Fei and   
                S. Chandran and   
                    C. Spinuzzi   Experience using Web-based shotgun
                                  measures for large-system
                                  characterization and improvement . . . . 268--277
                  B. Kitchenham   A procedure for analyzing unbalanced
                                  datasets . . . . . . . . . . . . . . . . 278--301
                L. Prechelt and   
                    W. F. Tichy   A controlled experiment to assess the
                                  benefits of procedure argument type
                                  checking . . . . . . . . . . . . . . . . 302--312

IEEE Transactions on Software Engineering
Volume 24, Number 5, May, 1998

                      Anonymous   Special Issue --- Mobility and
                                  Network-Aware Computing  . . . . . . . . 0:1--0:1
                G. C. Roman and   
                      C. Ghezzi   Introduction to the special issue  . . . 313--314
               R. De Nicola and   
              G. L. Ferrari and   
                    R. Pugliese   KLAIM: a kernel language for agents
                                  interaction and mobility . . . . . . . . 315--330
             M. Wermelinger and   
                 J. L. Fiadeiro   Connectors for mobile programs . . . . . 331--341
                A. Fuggetta and   
                G. P. Picco and   
                       G. Vigna   Understanding code mobility  . . . . . . 342--361
              P. Ciancarini and   
               R. Tolksdorf and   
                  F. Vitali and   
                   D. Rossi and   
                      A. Knoche   Coordinating multiagent applications on
                                  the WWW: a reference architecture  . . . 362--375
                J. Bolliger and   
                       T. Gross   A framework based approach to the
                                  development of network aware
                                  applications . . . . . . . . . . . . . . 376--390
                     S. Liu and   
               A. J. Offutt and   
                   C. Ho-Stuart   Correction to ``SOFL: A formal
                                  engineering methodology for industrial
                                  applications'' . . . . . . . . . . . . . 390--390
                 G. Welling and   
                B. R. Badrinath   An architecture for exporting
                                  environment awareness to mobile
                                  computing applications . . . . . . . . . 391--400

IEEE Transactions on Software Engineering
Volume 24, Number 6, June, 1998

               G. Rothermel and   
                  M. J. Harrold   Empirical studies of a safe regression
                                  test selection technique . . . . . . . . 401--419
             M. E. Helander and   
                  Ming Zhao and   
                     N. Ohlsson   Planning models for software reliability
                                  and cost . . . . . . . . . . . . . . . . 420--434
                   A. Arora and   
                 S. S. Kulkarni   Designing masking fault-tolerance via
                                  nonmasking fault-tolerance . . . . . . . 435--450
                  A. Waheed and   
                D. T. Rover and   
            J. K. Hollingsworth   Modeling and evaluating design
                                  alternatives for an on-line
                                  instrumentation system: a case study . . 451--470
               R. H. Carver and   
                  Kuo-Chung Tai   Use of sequencing constraints for
                                  specification-based testing of
                                  concurrent programs  . . . . . . . . . . 471--490
                R. Harrison and   
             S. J. Counsell and   
                    R. V. Nithi   An evaluation of the MOOD set of
                                  object-oriented software metrics . . . . 491--496

IEEE Transactions on Software Engineering
Volume 24, Number 7, July, 1998

                      D. Garlan   Guest Editorial. Introduction to the
                                  Special Section  . . . . . . . . . . . . 497--497
                    W. Chan and   
             R. J. Anderson and   
                   P. Beame and   
                   S. Burns and   
                 F. Modugno and   
                  D. Notkin and   
                    J. D. Reese   Model checking large software
                                  specifications . . . . . . . . . . . . . 498--520
                  D. Le Metayer   Describing software architecture styles
                                  using graph grammars . . . . . . . . . . 521--533
             W. G. Griswold and   
                 M. I. Chen and   
             R. W. Bowdidge and   
             J. L. Cabaniss and   
               V. B. Nguyen and   
             J. D. Morgenthaler   Tool support for planning the
                                  restructuring of data abstractions in
                                  large systems  . . . . . . . . . . . . . 534--558
               C. B. Seaman and   
                   V. R. Basili   Communication and organization: an
                                  empirical study of discussion in
                                  inspection meetings  . . . . . . . . . . 559--572
               K. M. Hansen and   
                 A. P. Ravn and   
                   V. Stavridou   From safety analysis to software
                                  requirements . . . . . . . . . . . . . . 573--584

IEEE Transactions on Software Engineering
Volume 24, Number 8, August, 1998

                A. Fuggetta and   
                   R. N. Taylor   Introduction to the Special Section  . . 585--585
               P. G. Frankl and   
               R. G. Hamlet and   
              B. Littlewood and   
                    L. Strigini   Evaluating testing methods by delivered
                                  reliability [software] . . . . . . . . . 586--601
              G. S. Avrunin and   
              J. C. Corbett and   
                   L. K. Dillon   Analyzing partially-implemented
                                  real-time systems  . . . . . . . . . . . 602--614
               A. H. Dutoit and   
                     B. Bruegge   Communication metrics for software
                                  development  . . . . . . . . . . . . . . 615--628
            S. R. Chidamber and   
                D. P. Darcy and   
                  C. F. Kemerer   Managerial use of metrics for
                                  object-oriented software: an exploratory
                                  analysis . . . . . . . . . . . . . . . . 629--639
              T. L. Roberts and   
               M. L. Gibson and   
               K. T. Fields and   
                   R. K. Rainer   Factors that impact implementing a
                                  system development methodology . . . . . 640--649
                 J. E. Cook and   
                L. G. Votta and   
                     A. L. Wolf   Cost-effective analysis of in-place
                                  software processes . . . . . . . . . . . 650--663
                  M. Hurfin and   
                  M. Mizuno and   
                  M. Raynal and   
                     M. Singhal   Efficient distributed detection of
                                  conjunctions of local predicates . . . . 664--677

IEEE Transactions on Software Engineering
Volume 24, Number 9, September, 1998

                    M. Jazayeri   Guest Editorial: Introduction to the
                                  Special Section  . . . . . . . . . . . . 681--681
               Yih-Fam Chen and   
              E. R. Gansner and   
                  E. Koutsofios   A C++ data model supporting reachability
                                  analysis and dead code detection . . . . 682--694
              J. Desharnais and   
                M. Frappier and   
                  R. Khedri and   
                        A. Mili   Integration of sequential scenarios  . . 695--708
                  J. Rushby and   
                    S. Owre and   
                     N. Shankar   Subtypes for specifications: predicate
                                  subtyping in PVS . . . . . . . . . . . . 709--720
                 G. Canfora and   
                A. Cimitile and   
              U. De Carlini and   
                    A. De Lucia   An extensible system for source code
                                  analysis . . . . . . . . . . . . . . . . 721--740
                   S. Schneider   Verifying authentication protocols in
                                  CSP  . . . . . . . . . . . . . . . . . . 741--758
                Xiping Song and   
                L. J. Osterweil   Engineering software design processes to
                                  guide process execution  . . . . . . . . 759--775

IEEE Transactions on Software Engineering
Volume 24, Number 10, October, 1998

               Yow-Jian Lin and   
                    M. Jazayeri   Managing Feature Interactions
                                  Telecommunications Software Systems ---
                                  Guest Editorial  . . . . . . . . . . . . 777--778
                 D. O. Keck and   
                    P. J. Kuehn   The feature and service interaction
                                  problem in telecommunications systems: a
                                  survey . . . . . . . . . . . . . . . . . 779--796
                  F. J. Lin and   
                   Hong Liu and   
                       A. Ghosh   A methodology for feature interaction
                                  detection in the AIN 0.1 framework . . . 797--817
                   S. Tsang and   
                   E. H. Magill   Learning to detect and avoid run-time
                                  feature interactions in intelligent
                                  networks . . . . . . . . . . . . . . . . 818--830
                 M. Jackson and   
                        P. Zave   Distributed feature composition: a
                                  virtual architecture for
                                  telecommunications services  . . . . . . 831--847
                S. Bhansali and   
                     T. J. Hoar   Automated software synthesis: an
                                  application in mechanical CAD  . . . . . 848--862
                 A. Lecerof and   
                     F. Paterno   Automatic support for usability
                                  evaluation . . . . . . . . . . . . . . . 863--888
             D. D. Deavours and   
                  W. H. Sanders   ``On-the-fly'' solution techniques for
                                  stochastic Petri nets and extensions . . 889--902

IEEE Transactions on Software Engineering
Volume 24, Number 11, November, 1998

          A. van Lamsweerde and   
                R. Darimont and   
                      E. Letier   Managing conflicts in goal-driven
                                  requirements engineering . . . . . . . . 908--926
               C. Heitmeyer and   
                   J. Kirby and   
                   B. Labaw and   
                  M. Archer and   
                   R. Bharadwaj   Using abstraction and model checking to
                                  detect safety violations in requirements
                                  specifications . . . . . . . . . . . . . 927--948
                  M. S. Feather   Rapid application of lightweight formal
                                  methods for consistency analyses . . . . 949--959
                  J. Grundy and   
                 J. Hosking and   
                 W. B. Mugridge   Inconsistency management for
                                  multiple-view software development
                                  environments . . . . . . . . . . . . . . 960--981
                      G. Cugola   Tolerating deviations in process support
                                  systems via flexible enactment of
                                  process models . . . . . . . . . . . . . 982--1001
               N. E. Fenton and   
                        M. Neil   A strategy for improving safety related
                                  software engineering standards . . . . . 1002--1013
                       Zhen Liu   Performance analysis of stochastic timed
                                  Petri nets using linear programming
                                  approach . . . . . . . . . . . . . . . . 1014--1030

IEEE Transactions on Software Engineering
Volume 24, Number 12, December, 1998

                   M. Jarke and   
                R. Kurki-Suonio   Introduction to the special issue  . . . 1033--1035
                  P. Haumer and   
                    K. Pohl and   
                 K. Weidenhaupt   Requirements elicitation and validation
                                  with real world scenes . . . . . . . . . 1036--1054
                 C. Rolland and   
                C. Souveyet and   
                   C. B. Achour   Guiding goal modeling using scenarios    1055--1071
            A. G. Sutcliffe and   
            N. A. M. Maiden and   
                 S. Minocha and   
                      D. Manuel   Supporting scenario-based requirements
                                  engineering  . . . . . . . . . . . . . . 1072--1088
          A. van Lamsweerde and   
                    L. Willemet   Inferring declarative requirements
                                  specifications from operational
                                  scenarios  . . . . . . . . . . . . . . . 1089--1114
                Woo Jin Lee and   
              Sung Deok Cha and   
                  Yong Rae Kwon   Integration and analysis of use cases
                                  using modular Petri nets in requirements
                                  engineering  . . . . . . . . . . . . . . 1115--1130
                  R. J. A. Buhr   Use case maps as architectural entities
                                  for complex systems  . . . . . . . . . . 1131--1155
              J. M. Carroll and   
               M. B. Rosson and   
                    G. Chin and   
                   J. Koenemann   Requirements development in
                                  scenario-based design  . . . . . . . . . 1156--1170
             O. Stiemerling and   
                  A. B. Cremers   The use of cooperation scenarios in the
                                  design and evaluation of a CSCW system   1171--1181
                   W. Dzida and   
                     R. Freitag   Making use of scenarios for validating
                                  analysis and design  . . . . . . . . . . 1182--1196


IEEE Transactions on Software Engineering
Volume 25, Number 1, January / February, 1999

          C. T. Karamanolis and   
                    J. N. Magee   Client-access protocols for replicated
                                  services . . . . . . . . . . . . . . . . 3--21
             G. C. Buttazzo and   
                     M. Caccamo   Minimizing aperiodic response times in a
                                  firm real-time environment . . . . . . . 22--32
            F. Borges Paulo and   
              P. C. Masiero and   
     M. C. Ferreira de Oliveira   Hypercharts: extended statecharts to
                                  support hypermedia specification . . . . 33--49
               A. D. Stoyen and   
              T. J. Marlowe and   
               M. F. Younis and   
                   P. V. Petrov   A development environment for complex
                                  distributed real-time applications . . . 50--74
                R. K. Joshi and   
                      D. J. Ram   Anonymous remote computing: a paradigm
                                  for parallel programming on
                                  interconnected workstations  . . . . . . 75--90
               L. C. Briand and   
                 J. W. Daly and   
                     J. K. Wust   A unified framework for coupling
                                  measurement in object-oriented systems   91--121
             C. E. Hrischuk and   
         C. Murray Woodside and   
                    J. A. Rolia   Trace-based load characterization for
                                  generating performance software models   122--135
                 N. B. Ebrahimi   How to improve the calibration of cost
                                  models . . . . . . . . . . . . . . . . . 136--140
                      Anonymous   1998 reviewer list . . . . . . . . . . . 141--144

IEEE Transactions on Software Engineering
Volume 25, Number 2, March / April, 1999

                  G. Chiola and   
                  W. H. Sanders   Guest Editorial: Introduction to the
                                  Special Section  . . . . . . . . . . . . 145--146
                  J. Campos and   
               S. Donatelli and   
                       M. Silva   Structured solution of asynchronously
                                  communicating stochastic modules . . . . 147--165
                    P. Buchholz   Hierarchical structuring of superposed
                                  GSPNs  . . . . . . . . . . . . . . . . . 166--181
                      P. Kemper   Transient analysis of superposed GSPNs   182--193
                  A. Heindl and   
                      R. German   A fourth-order algorithm with automatic
                                  stepsize control for the transient
                                  analysis of DSPNs  . . . . . . . . . . . 194--206
                  G. Ciardo and   
                D. M. Nicol and   
                  K. S. Trivedi   Discrete-event simulation of fluid
                                  stochastic Petri nets  . . . . . . . . . 207--217
                     P. J. Haas   Estimation methods for nonregenerative
                                  stochastic Petri nets  . . . . . . . . . 218--236
                     A. Ferscha   Adaptive time warp simulation of timed
                                  Petri nets . . . . . . . . . . . . . . . 237--257
                 Kentaro Go and   
                   N. Shiratori   A decomposition of a formal
                                  specification: an improved
                                  constraint-oriented method . . . . . . . 258--273
               J. M. Helary and   
            R. H. B. Netzer and   
                      M. Raynal   Consistency issues in distributed
                                  checkpoints  . . . . . . . . . . . . . . 274--281
                 L. Pickard and   
              B. Kitchenham and   
                   P. Jones and   
                        Qing Hu   Comments on: ``Evaluating alternative
                                  software production functions''  . . . . 282--285
                  P. Franki and   
                  D. Hamlet and   
              B. Littlewood and   
                    L. Strigini   Call for papers  . . . . . . . . . . . . 286--286

IEEE Transactions on Software Engineering
Volume 25, Number 3, May / June, 1999

              J. C. Ramming and   
                     D. S. Wile   Guest editorial --- introduction to the
                                  special section  . . . . . . . . . . . . 289--290
                     C. Elliott   An embedded modeling language approach
                                  to interactive 3D and multimedia
                                  animation  . . . . . . . . . . . . . . . 291--308
                L. Cardelli and   
                      R. Davies   Service combinators for Web computing    309--316
                 S. Chandra and   
                B. Richards and   
                    J. R. Larus   Teapot: a domain-specific language for
                                  writing cache coherence protocols  . . . 317--333
               D. L. Atkins and   
                    T. Ball and   
                   G. Bruns and   
                         K. Cox   Mawl: a domain-specific language for
                                  form-based services  . . . . . . . . . . 334--346
                F. Bertrand and   
                    M. Augeraud   BDL: a specialized language for
                                  per-object reactive control  . . . . . . 347--362
             S. A. Thibault and   
                  R. Marlet and   
                      C. Consel   Domain-specific languages: from design
                                  to implementation application to video
                                  device drivers generation  . . . . . . . 363--377
                N. Klarlund and   
             M. I. Schwartzbach   A domain-specific language for regular
                                  sets of strings and trees  . . . . . . . 378--386
                   D. R. Engler   Interface compilation: steps toward
                                  compiling program interfaces as
                                  languages  . . . . . . . . . . . . . . . 387--400
           T. A. Varvarigou and   
           M. E. Anagnostou and   
                    S. R. Ahuja   Reconfiguration models and algorithms
                                  for stateful interactive processes . . . 401--415
                   P. Caspi and   
                 A. Girault and   
                      D. Pilaud   Automatic distribution of reactive
                                  systems for asynchronous networks of
                                  processors . . . . . . . . . . . . . . . 416--427
                     S. D. Lang   An extended banker's algorithm for
                                  deadlock avoidance . . . . . . . . . . . 428--432

IEEE Transactions on Software Engineering
Volume 25, Number 4, July / August, 1999

              D. R. Jeffery and   
                    L. G. Votta   Empirical Software Engineering . . . . . 435--437
               G. C. Murphy and   
               R. J. Walker and   
             E. L. A. Banlassad   Evaluating emerging software development
                                  technologies: lessons learned from
                                  assessing aspect-oriented programming    438--455
               V. R. Basili and   
                   F. Shull and   
                    F. Lanubile   Building knowledge through families of
                                  experiments  . . . . . . . . . . . . . . 456--473
                   K. Torii and   
               K. Matsumoto and   
                K. Nakakoji and   
                  Y. Takada and   
                  S. Takada and   
                       K. Shima   Ginger2: an environment for
                                  computer-aided empirical software
                                  engineering  . . . . . . . . . . . . . . 474--492
              C. F. Kemerer and   
                   S. Slaughter   An empirical approach to studying
                                  software evolution . . . . . . . . . . . 493--509
                I. Myrtveit and   
                    E. Stensrud   A controlled experiment to assess the
                                  benefits of estimating with analogy and
                                  regression models  . . . . . . . . . . . 510--525
          A. von Mayrhauser and   
                        S. Lang   A coding scheme to support systematic
                                  analysis of software comprehension . . . 526--540
                 R. Agarwal and   
                      P. De and   
                    A. P. Sinha   Comprehending object and process models:
                                  an empirical study . . . . . . . . . . . 541--556
                   C. B. Seaman   Qualitative methods in empirical studies
                                  of software engineering  . . . . . . . . 557--572
                 S. Chulani and   
                   B. Boehm and   
                      B. Steece   Bayesian analysis of empirical software
                                  engineering cost models  . . . . . . . . 573--583
             K. J. Sullivan and   
               M. Marchukov and   
                       J. Socha   Analysis of a conflict between
                                  aggregation and interface negotiation in
                                  Microsoft's Component Object Model . . . 584--599

IEEE Transactions on Software Engineering
Volume 25, Number 5, September / October, 1999

                  C. Fetzer and   
                    F. Cristian   A highly available local leader election
                                  service  . . . . . . . . . . . . . . . . 603--618
              Z. Kalbarczyk and   
                 R. K. Iyer and   
                 G. L. Ries and   
                J. U. Patel and   
                  M. S. Lee and   
                        Y. Xiao   Hierarchical simulation approach to
                                  accurate fault modeling for system
                                  dependability evaluation . . . . . . . . 619--632
                  R. Ortalo and   
                Y. Deswarte and   
                    M. Kaaniche   Experimenting with quantitative
                                  evaluation tools for monitoring
                                  operational security . . . . . . . . . . 633--650
                      J. Rushby   Systematic formal verification for
                                  fault-tolerant time-triggered algorithms 651--660
                  W. J. Gutjahr   Partition testing vs. random testing:
                                  the influence of uncertainty . . . . . . 661--674
               N. E. Fenton and   
                        M. Neil   A critique of software defect prediction
                                  models . . . . . . . . . . . . . . . . . 675--689
                 I. R. Chen and   
                  S. A. Banawan   Performance and stability analysis of
                                  multilevel data structures with deferred
                                  reorganization . . . . . . . . . . . . . 690--700
               M. F. Younis and   
              T. J. Marlowe and   
               A. D. Stoyen and   
                        G. Tsai   Statically safe speculative execution
                                  for real-time systems  . . . . . . . . . 701--721
               L. C. Briand and   
                 S. Morasca and   
                   V. R. Basili   Defining and validating measures for
                                  object-based high-level design . . . . . 722--743

IEEE Transactions on Software Engineering
Volume 25, Number 6, November / December, 1999

              M. J. Harrold and   
                   H. A. Muller   Guest editorial: introduction to the
                                  special section  . . . . . . . . . . . . 747--748
                    M. Siff and   
                        T. Reps   Identifying modules via concept analysis 749--768
             N. F. Schneidewind   Measuring and evaluating maintenance
                                  process using reliability, risk, and
                                  test metrics . . . . . . . . . . . . . . 769--781
                  C. Ghezzi and   
                    B. Nuseibeh   Guest editorial: introduction to the
                                  special section  . . . . . . . . . . . . 782--783
             I. Sommerville and   
                  P. Sawyer and   
                      S. Viller   Managing process inconsistency using
                                  viewpoints . . . . . . . . . . . . . . . 784--799
             M. S. Krishnan and   
                  M. I. Kellner   Measuring process consistency:
                                  implications for reducing software
                                  defects  . . . . . . . . . . . . . . . . 800--815
             W. N. Robinson and   
                S. D. Pawlowski   Managing requirements inconsistency with
                                  development goal monitors  . . . . . . . 816--835
                W. Emmerich and   
             A. Finkelstein and   
              C. Montangero and   
               S. Antonelli and   
                S. Armitage and   
                     R. Stevens   Managing standards compliance  . . . . . 836--851
                 E. C. Lupu and   
                      M. Sloman   Conflicts in policy-based distributed
                                  systems management . . . . . . . . . . . 852--869
              D. J. Simpson and   
                   F. W. Burton   Space efficient execution of
                                  deterministic parallel programs  . . . . 870--882


IEEE Transactions on Software Engineering
Volume 27, Number 3, March, 2001

                S. B. Yadav and   
                 N. G. Shaw and   
                    L. Webb and   
                   C. Sutcu and   
              T. L. Roberts and   
               M. L. Gibson and   
               R. K. Rainer and   
                   K. T. Fields   Comments on ``Factors that impact
                                  implementing a system development
                                  methodology'' [with reply] . . . . . . . 279--286
              T. L. Roberts and   
               M. L. Gibson and   
               R. K. Rainer and   
                   K. T. Fields   Response to ``Comments on factors that
                                  impact the implementation of a systems
                                  development methodology''  . . . . . . . 282--286

IEEE Transactions on Software Engineering
Volume 27, Number 6, June, 2001

               Ki-Seok Bang and   
             Jin-Young Choi and   
                      Chuck Yoo   Comments on ``The Model Checker SPIN''   573--576


IEEE Transactions on Software Engineering
Volume 32, Number 5, May, 2006

                        L. Pike   A note on inconsistent axioms in
                                  Rushby's ``Systematic formal
                                  verification for fault-tolerant
                                  time-triggered algorithms''  . . . . . . 347--348