Last update:
Sat Nov 23 12:25:13 MST 2019
G. J. Schick and
R. W. Wolverton An Analysis of Competing Software
Reliability Models . . . . . . . . . . . 104--120
T. F. Gannon and
S. D. Shapiro An Optimal Approach to Fault Tolerant
Software Systems Design . . . . . . . . 390--409
Anonymous Editor's Notice . . . . . . . . . . . . 1--1
K. L. Heninger Specifying Software Requirements for
Complex Systems: New Techniques and
Their Application . . . . . . . . . . . 2--13
J. Guttag Notes on Type Abstraction (Version 2) 13--23
D. R. Musser Abstract Data Type Specification in the
Affirm System . . . . . . . . . . . . . 24--32
S. K. Basu A Note on Synthesis of Inductive
Assertions . . . . . . . . . . . . . . . 32--39
M. Tamir ADI: Automatic Derivation of Invariants 40--48
A. P. Ravn Device Monitors . . . . . . . . . . . . 49--53
H. Takahashi An Automatic-Controller Description
Language . . . . . . . . . . . . . . . . 53--64
P. J. Denning Working Sets Past and Present . . . . . 64--84
D. W. Leinbaugh Guaranteed Response Times in a
Hard-Real-Time Environment . . . . . . . 85--91
J. Banerjee and
D. K. Hsiao and
F. K. Ng Database Transformation, Query
Translation, and Performance Analysis of
a New Database Computer in Supporting
Hierarchical Database Management . . . . 91--109
Anonymous Acknowledgment of referees . . . . . . . 110--111
Anonymous Computer Communication Professionals
\ldots . . . . . . . . . . . . . . . . . 112--112
Anonymous Call for Papers . . . . . . . . . . . . 112--112
Anonymous Information for authors . . . . . . . . 112--112
Anonymous IEEE copyright form . . . . . . . . . . 112--112
Anonymous Information about the Society . . . . . 112--c-112--c
Anonymous IEEE Computer Society Publications . . . 112--e-112--e
Anonymous IEEE Computer Society . . . . . . . . . c2--c2
Anonymous \booktitleIEEE Transactions on Software
Engineering --- Table of contents . . . c1--c1
Anonymous Guest Editorial . . . . . . . . . . . . 117--117
R. C. Cheung A User-Oriented Software Reliability
Model . . . . . . . . . . . . . . . . . 118--125
S. S. Yau and
Fu-Chung Chen An Approach to Concurrent Control Flow
Checking . . . . . . . . . . . . . . . . 126--137
T. L. Booth and
C. A. Wiecek Performance Abstract Data Types as a
Tool in Software Performance Analysis
and Design . . . . . . . . . . . . . . . 138--151
L. L. Beck A Generalized Implementation Method for
Relational Data Sublanguages . . . . . . 152--162
W. E. Howden Functional Program Testing . . . . . . . 162--169
S. K. Basu On Development of Iterative Programs
from Function Specifications . . . . . . 170--182
D. L. Russell State Restoration in Systems of
Communicating Processes . . . . . . . . 183--194
T. W. Mao and
R. T. Yeh Communication Port: A Language Concept
for Concurrent Programming . . . . . . . 194--204
Shi-Kuo Chang and
Wu-Haung Cheng A Methodology for Structured Database
Decomposition . . . . . . . . . . . . . 205--218
P. S. Kritzinger and
A. E. Krzesinski and
P. Teunissen A Queuing Model of a Time-Sliced
Priority-Driven Task Dispatching
Algorithm . . . . . . . . . . . . . . . 219--225
Pei Hsia and
F. E. Petry A Framework for Discipline in
Programming . . . . . . . . . . . . . . 226--232
Anonymous Call for Papers . . . . . . . . . . . . 232--232
Anonymous IEEE Computer Society Publications . . . 232--a-232--a
Anonymous IEEE Computer Society . . . . . . . . . c2--c2
Anonymous \booktitleIEEE Transactions on Software
Engineering --- Table of contents . . . c1--c1
B. Chandrasekaran Guest Editorial: Special Collection on
Program Testing . . . . . . . . . . . . 233--235
E. J. Weyuker and
T. J. Ostrand Theories of Program Testing and the
Application of Revealing Subdomains . . 236--246
L. J. White and
E. I. Cohen A Domain Strategy for Computer Program
Testing . . . . . . . . . . . . . . . . 247--257
K. A. Foster Error Sensitive Test Cases Analysis
(ESTCA) . . . . . . . . . . . . . . . . 258--264
R. N. Taylor and
L. J. Osterweil Anomaly Detection in Concurrent Software
by Static Data Flow Analysis . . . . . . 265--278
M. R. Woodward and
D. Hedley and
M. A. Hennell Experience with Path Analysis and
Testing of Programs . . . . . . . . . . 278--286
U. Voges and
L. Gmeiner and
A. A. Von Mayrhauser SADAT --- an Automated Testing Tool . . 286--290
F. N. Parr An Alternative to the Rayleigh Curve
Model for Software Development Effort 291--296
D. B. Lomet Subsystems of Processes with Deadlock
Avoidance . . . . . . . . . . . . . . . 297--304
B. Walke and
W. Rosenbohm Deadline-Oriented Servicing:
Waiting-Time Distributions . . . . . . . 304--312
Anonymous Call for Papers . . . . . . . . . . . . 312--312
Anonymous IEEE Computer Society Publications . . . 312--a-312--a
Anonymous IEEE Computer Society . . . . . . . . . c2--c2
Anonymous \booktitleIEEE Transactions on Software
Engineering --- Table of contents . . . c1--c1
C. N. Fischer and
R. J. LeBlanc The Implementation of Run-Time
Diagnostics in Pascal . . . . . . . . . 313--319
A. Celentano and
P. D. Vigna and
C. Ghezzi and
D. Mandrioli Separate Compilation and Partial
Specification in Pascal . . . . . . . . 320--328
M. A. Hennell and
J. A. Prudom A Static Analysis of the NAG Library . . 329--333
K. R. Tavernier and
P. H. Notredame Macro-Based Cross Assemblers . . . . . . 334--340
T. Y. Young and
P. S. Liu Overhead Storage Considerations and a
Multilinear Method for Data File
Compression . . . . . . . . . . . . . . 340--347
A. Reuter A Fast Transaction-Oriented Logging
Scheme for Undo Recovery . . . . . . . . 348--356
W. T. Hardgrave Ambiguity in Processing Boolean Queries
on TDMS Tree Structures: A Study of Four
Different Philosophies . . . . . . . . . 357--372
J. Labetoulle and
G. Pujolle Isolation Method in a Network of Queues 373--381
P. S. Kritzinger and
A. E. Krzesinski and
P. Teunissen Incorporating System Overhead in Queuing
Network Models . . . . . . . . . . . . . 381--390
J. E. Allchin Modula and a Question of Time . . . . . 390--391
A. C. Davies The Analogy Between Electrical Networks
and Flowcharts . . . . . . . . . . . . . 391--394
P. Bourret and
P. Cros Presentation and Correction of Errors in
Operating System Measurements . . . . . 395--398
Anonymous CompCon 80 Fall . . . . . . . . . . . . 398--398
Anonymous Information about the Society . . . . . 398--a-398--b
Anonymous IEEE Computer Society Publications . . . 398--c-398--c
Anonymous IEEE Computer Society . . . . . . . . . c2--c2
Anonymous \booktitleIEEE Transactions on Software
Engineering --- Table of contents . . . c1--c1
Anonymous Editor's Notice . . . . . . . . . . . . 401--401
Y. M. Babad and
J. A. Hoffer Data Element Security and Its Effects on
File Segmentation . . . . . . . . . . . 402--410
E. Gudes The Design of a Cryptography Based
Secure File System . . . . . . . . . . . 411--420
L. J. Mekly and
S. S. Yau Software Design Representation Using
Abstract Process Networks . . . . . . . 420--435
V. D. Gligor and
S. H. Shattuck On Deadlock Detection in Distributed
Systems . . . . . . . . . . . . . . . . 435--440
C. V. Ramamoorthy and
G. S. Ho Performance Evaluation of Asynchronous
Concurrent Systems Using Petri Nets . . 440--449
A. D. Birrell and
R. M. Needham A Universal File Server . . . . . . . . 450--453
V. R. Basili and
R. E. Noonan A Comparison of the Axiomatic and
Functional Models of Structured
Programming . . . . . . . . . . . . . . 454--465
J. C. King Program correctness: on inductive
assertion methods . . . . . . . . . . . 465--479
J. C. Huang A New Verification Rule and Its
Applications . . . . . . . . . . . . . . 480--484
W. H. Leung and
C. V. Ramamoorthy An Approach to Formal Specification of
Control Modules . . . . . . . . . . . . 485--489
B. Littlewood Theories of Software Reliability: How
Good Are They and How Can They Be
Improved? . . . . . . . . . . . . . . . 489--500
A. L. Goel A Summary of the Discussion on ``An
Analysis of Competing Software
Reliability Models'' . . . . . . . . . . 501--502
Anonymous Advance Announcing \ldots Tutorial
Week80 . . . . . . . . . . . . . . . . . 502--502
Anonymous Call for Papers . . . . . . . . . . . . 502--502
Anonymous Call for Papers . . . . . . . . . . . . 502--502
Anonymous IEEE Computer Society Publications . . . 502--c-502--c
Anonymous IEEE Computer Society . . . . . . . . . c2--c2
Anonymous \booktitleIEEE Transactions on Software
Engineering --- Table of contents . . . c1--c1
Anonymous Guest Editorial . . . . . . . . . . . . 505--505
A. L. Baker and
S. H. Zweben A Comparison of Measures of Control Flow
Complexity . . . . . . . . . . . . . . . 506--512
R. N. Faiman and
A. A. Koretesoja An Optimizing Pascal Compiler . . . . . 512--519
Ning-San Chang and
King-Sun Fu Query-by-Pictorial-Example . . . . . . . 519--524
T. Murata Synthesis of Decision-Free Concurrent
Systems for Prescribed Resources and
Performance . . . . . . . . . . . . . . 525--530
Kuo-Chung Tai Program Testing Complexity and Test
Criteria . . . . . . . . . . . . . . . . 531--538
K. Voss Using Predicate/Transition-Nets to Model
and Analyze Distributed Database Systems 539--544
S. S. Yau and
J. S. Collofello Some Stability Measures for Software
Maintenance . . . . . . . . . . . . . . 545--552
R. F. Brender Generation of Blisses . . . . . . . . . 553--563
R. P. Cook *MOD --- a Language for Distributed
Programming . . . . . . . . . . . . . . 563--571
J. L. Bentley and
M. Shaw An Alphard Specification of a Correct
and Efficient Transformation on Data
Structures . . . . . . . . . . . . . . . 572--584
D. J. Taylor and
D. E. Morgan and
J. P. Black Redundancy in Data Structures: Improving
Software Fault Tolerance . . . . . . . . 585--594
D. J. Taylor and
D. E. Morgan and
J. P. Black Redundancy in Data Structures: Some
Theoretical Results . . . . . . . . . . 595--602
H. F. Ledgard and
J. A. Whiteside and
W. Seymour and
A. Singer An Experiment on Human Engineering of
Interactive Software . . . . . . . . . . 602--604
Anonymous Advance Announcement \ldots Tutorial
Week80 . . . . . . . . . . . . . . . . . 604--604
Anonymous Call for Papers . . . . . . . . . . . . 604--604
Anonymous Call for Papers . . . . . . . . . . . . 604--604
Anonymous 1980 Index \booktitleIEEE Transactions
on Software Engineering Vol. SE-6 . . . 604--604
Anonymous Information about the Society . . . . . 604--h-604--h
Anonymous IEEE Computer Society Publications . . . 604--i-604--i
Anonymous IEEE Computer Society . . . . . . . . . c2--c2
Anonymous \booktitleIEEE Transactions on Software
Engineering --- Table of contents . . . c1--c1
Anonymous Editorial: Program Transformations . . . 1--2
R. Balzer Transformational Implementation: An
Example . . . . . . . . . . . . . . . . 3--14
M. Broy and
P. Pepper Program Development as a Formal Activity 14--22
E. Deak A Transformational Derivation of a
Parsing Algorithm in a High-Level
Language . . . . . . . . . . . . . . . . 23--31
D. S. Wile Type Transformations . . . . . . . . . . 32--39
J. Arthur and
J. Ramanathan Design of Analyzers for Selective
Program Analysis . . . . . . . . . . . . 39--51
K. L. Clark and
M. H. Van Emden Consequence Verification of Flowcharts 52--60
L. H. Holley and
B. K. Rosen Qualified Data Flow Problems . . . . . . 60--78
E. G. Coffman and
E. Gelenbe and
B. Plateau Optimization of the Number of Copies in
a Distributed Data Base . . . . . . . . 78--84
P. A. Ng Further Analysis of the
Entity-Relationship Approach to Database
Design . . . . . . . . . . . . . . . . . 85--99
S. Al-Fedaghi and
P. Scheuermann Mapping Considerations in the Design of
Schemas for the Relational Model . . . . 99--111
B. Srinivasan and
R. Sankar Algorithms to Distribute a Database for
Parallel Searching . . . . . . . . . . . 112--112
R. L. Budzinski and
E. S. Davidson and
W. Mayeda and
H. S. Stone DMIN: An Algorithm for Computing the
Optimal Dynamic Allocation in a Virtual
Memory Computer . . . . . . . . . . . . 113--121
R. L. Budzinski and
E. S. Davidson A Comparison of Dynamic and Static
Virtual Memory Allocation Algorithms . . 122--131
P. Sipala Optimum Cell Size for the Storage of
Messages . . . . . . . . . . . . . . . . 132--134
A. J. Smith Internal Scheduling and Memory
Contention . . . . . . . . . . . . . . . 135--146
J. W. Duran and
J. J. Wiorkowski Capture-Recapture Sampling for
Estimating Software Error Content . . . 147--148
Anonymous 1980 Referees List . . . . . . . . . . . 148--149
Anonymous Information for authors . . . . . . . . 150--150
Anonymous Call for Papers . . . . . . . . . . . . 151--151
Anonymous IEEE copyright form . . . . . . . . . . 151--151
Anonymous 5th International Conference on Software
Engineering . . . . . . . . . . . . . . 151--151
Anonymous IEEE Computer Society Publications . . . 151--j-151--j
Anonymous IEEE Computer Society . . . . . . . . . c2--c2
Anonymous \booktitleIEEE Transactions on Software
Engineering --- Table of contents . . . c1--c1
Anonymous Editor's Notice . . . . . . . . . . . . 161--161
R. L. Glass Persistent Software Errors . . . . . . . 162--168
D. Comer Principles of Program Design Induced
from Experience with Small Public
Programs . . . . . . . . . . . . . . . . 169--174
B. Lint and
T. Agerwala Communication Issues in the Design and
Analysis of Parallel Algorithms . . . . 174--188
D. Coleman and
J. W. Hughes and
M. S. Powell A Method for the Syntax Directed Design
of Multiprograms . . . . . . . . . . . . 189--196
H. A. Ellozy The Determination of Loop Invariants for
Programs with Arrays . . . . . . . . . . 197--206
N. Dershowitz and
Z. Manna Inference Rules for Program Annotation 207--222
E. M. Reingold and
J. S. Tilford Tidier Drawings of Trees . . . . . . . . 223--228
P. Reisner Formal Grammar and Human Factors Design
of an Interactive Graphics System . . . 229--240
R. Sanford and
J. Gibson Simplifld Alfu-N2merik FOnetiks (Sanf) 241--248
T. Chusho and
T. Hayashi Performance Analyses of Paging
Algorithms for Compilation of a Highly
Modularized Program . . . . . . . . . . 248--254
G. C. Goldbogen PRIM: A Fast Matrix Transpose Method . . 255--257
Anonymous Announcement & Call for Papers . . . . . 257--257
Anonymous Call for Papers . . . . . . . . . . . . 257--257
Anonymous IEEE Computer Society Publications . . . 257--d-257--d
Anonymous IEEE Computer Society Press . . . . . . 257--a-257--b
Anonymous IEEE Computer Society . . . . . . . . . c2--c2
Anonymous \booktitleIEEE Transactions on Software
Engineering --- Table of contents . . . c1--c1
P. Y. R. Ma and
T. G. Lewis On the Design of a Microcode Compiler
for a Machine-Independent High-Level
Language . . . . . . . . . . . . . . . . 261--274
C. Wetherell and
A. Shannon LR --- Automatic Parser Generator and
LR(1) Parser . . . . . . . . . . . . . . 274--278
G. K. Papakonstantinou An Interpreter of Attribute Grammars and
Its Application to Waveform Analysis . . 279--283
Jo-Mei Chang and
King-Sun Fu Extended K-d Tree Database Organization:
A Dynamic Multiattribute Clustering
Method . . . . . . . . . . . . . . . . . 284--290
R. M. Bryant On Homogeneity and On-Line--Off-Line
Behavior in M/G/1 Queueing Systems . . . 291--299
V. R. Basili and
R. W. Reiter A Controlled Experiment Quantitatively
Comparing Software Development
Approaches . . . . . . . . . . . . . . . 299--320
A. Brandwajn and
J. A. Hernandez A Study of a Mechanism for Controlling
Multiprogrammed Memory in an Interactive
System . . . . . . . . . . . . . . . . . 321--331
Anonymous Call for Papers . . . . . . . . . . . . 332--332
Anonymous 8th International Colloquium on
Automata, Languages and Programming
(ICALP 81) . . . . . . . . . . . . . . . 332--332
Anonymous IEEE Computer Society Publications . . . 332--a-332--a
Anonymous IEEE Computer Society . . . . . . . . . c2--c2
Anonymous \booktitleIEEE Transactions on Software
Engineering --- Table of contents . . . c1--c1
R. H. Thayer and
A. B. Pyster and
R. C. Wood Major Issues in Software Engineering
Project Management . . . . . . . . . . . 333--342
D. E. Peercy A Software Maintainability Evaluation
Methodology . . . . . . . . . . . . . . 343--351
Anonymous Editor's Note . . . . . . . . . . . . . 352--352
A. Singer and
H. Ledgard and
J. F. Hueras The Annotated Assistant: A Step Towards
Human Engineering . . . . . . . . . . . 353--373
T. Robers Global Comments . . . . . . . . . . . . 370--370
B. Shneiderman Comments from a Letter Written on July
19, 1978 . . . . . . . . . . . . . . . . 370--371
A. Singer and
H. Ledgard and
J. F. Hueras Author's reply . . . . . . . . . . . . . 373--374
G. Jomier A Mathematical Model for the Comparison
of Static and Dynamic Memory Allocation
in a Paged System . . . . . . . . . . . 375--385
L. M. Ni and
Kai Hwang Performance Modeling of Shared-Resource
Array Processors . . . . . . . . . . . . 386--394
H. G. Perros A Symmetrical Exponential Open Queue
Network with Blocking and Feedback . . . 395--402
A. J. Smith Analysis of Long Term File Reference
Patterns for Application to File
Migration Algorithms . . . . . . . . . . 403--417
J. Misra and
K. M. Chandy Proofs of Networks of Processes . . . . 417--426
S. S. Yau and
Chen-Chau Yang and
S. M. Shatz An Approach to Distributed Computing
System Software Design . . . . . . . . . 427--436
S. K. Shrivastava Structuring Distributed Systems for
Recoverability and Crash Resistance . . 436--447
P. R. Eggert Runtime Checking for ISO Standard Pascal 447--448
Anonymous Call for Papers . . . . . . . . . . . . 448--448
Anonymous IEEE Computer Society Publications . . . 448--a-448--a
Anonymous IEEE Computer Society . . . . . . . . . c2--c2
Anonymous \booktitleIEEE Transactions on Software
Engineering --- Table of contents . . . c1--c1
D. R. Barstow and
H. E. Shrobe Guest Editorial: Programming
Environments . . . . . . . . . . . . . . 449--450
J. W. Goodwin Why Programming Environments Need
Dynamic Data Types . . . . . . . . . . . 451--457
E. Kant and
D. R. Barstow The Refinement Paradigm: The Interaction
of Coding and Efficiency Knowledge in
Program Synthesis . . . . . . . . . . . 458--471
R. Medina-Mora and
P. H. Feiler An Incremental Programming Environment 472--482
B. W. Boehm An Experiment in Small-Scale Application
Software Engineering . . . . . . . . . . 482--493
V. H. Haase Real-Time Behavior of Programs . . . . . 494--501
J. L. W. Kessels The Soma: A Programming Construct for
Distributed Processing . . . . . . . . . 502--509
S. Henry and
D. Kafura Software Structure Metrics Based on
Information Flow . . . . . . . . . . . . 510--518
A. J. Blikle On the Development of Correct Specified
Programs . . . . . . . . . . . . . . . . 519--527
Anonymous Advance Announcement \ldots Tutorial
Week West81 . . . . . . . . . . . . . . 527--527
Anonymous Call for Papers . . . . . . . . . . . . 527--527
Anonymous IEEE Computer Society Publications . . . 527--b-527--b
Anonymous IEEE Computer Society . . . . . . . . . c2--c2
Anonymous \booktitleIEEE Transactions on Software
Engineering --- Table of contents . . . c1--c1
Anonymous Editor's Notice . . . . . . . . . . . . 529--529
Anonymous Guest Editorial . . . . . . . . . . . . 530--530
S. W. Smoliar Operational Requirements Accommodation
in Distributed System Design . . . . . . 531--537
C. V. Ramamoorthy and
Y. R. Mok and
F. B. Bastani and
G. H. Chin and
K. Suzuki Application of a Methodology for the
Development and Validation of Reliable
Process Control Software . . . . . . . . 537--555
S. S. Yau and
P. C. Grabow A Model for Representing Programs Using
Hierarchical Graphs . . . . . . . . . . 556--574
K. P. Eswaran and
V. C. Hamacher and
G. S. Shedler Collision-Free Access Control for
Computer Communication Bus Networks . . 574--582
S. H. Bokhari A Shortest Tree Algorithm for Optimal
Assignments Across Space and Time in a
Distributed Processor System . . . . . . 583--589
R. L. Baber A Method for Representing Data Items of
Unlimited Length in a Computer Memory 590--593
A. L. Mennie and
G. H. Macewen Information Flow Certification Using an
Intermediate Code Program Representation 594--607
P. A. Lee and
J. L. Lloyd and
S. K. Shrivastava Some Critical Comments on the Paper ``An
Optimal Approach to Fault Tolerant
Software Systems Design'' by Gannon and
Shapiro . . . . . . . . . . . . . . . . 608--610
T. F. Gannon and
S. D. Shapiro Comments on the Critique of Lee, Lloyd,
and Shrivastava . . . . . . . . . . . . 610--611
Anonymous Advance Announcement \ldots Tutorial
Week East82 . . . . . . . . . . . . . . 611--611
Anonymous 1981 Index \booktitleIEEE Transactions
on Software Engineering Vol. SE-7 . . . 611--611
Anonymous IEEE Computer Society Publications . . . 611--f-611--f
Anonymous IEEE Computer Society . . . . . . . . . c2--c2
Anonymous \booktitleIEEE Transactions on Software
Engineering --- Table of contents . . . c1--c1
R. C. Waters The Programmer's Apprentice: Knowledge
Based Program Editing . . . . . . . . . 1--12
A. Moitra Direct Implementation of Algebraic
Specification of Abstract Data Types . . 12--20
J. Schwarz Using Annotations to Make Recursion
Equations Behave . . . . . . . . . . . . 21--33
R. L. Probert Optimal Insertion of Software Probes in
Well-Delimited Programs . . . . . . . . 34--42
R. B. Dannenberg and
G. W. Ernst Formal Program Verification Using
Symbolic Execution . . . . . . . . . . . 43--52
A. Ephremides and
O. A. Mowafi Analysis of a Hybrid Access Scheme for
Buffered Users-Probabilistic Time
Division . . . . . . . . . . . . . . . . 52--61
P. B. Hawthorn and
D. J. DeWitt Performance Analysis of Alternative
Database Machine Architectures . . . . . 61--75
A. K. Agrawala and
S. K. Tripathi and
G. Ricart Adaptive Routing Using a Virtual Waiting
Time Technique . . . . . . . . . . . . . 76--81
Anonymous Information for authors . . . . . . . . 82--82
Anonymous Advance Announcement \ldots Tutorial
Week East 82 . . . . . . . . . . . . . . 83--83
Anonymous Call for Papers . . . . . . . . . . . . 83--83
Anonymous IEEE copyright form . . . . . . . . . . 83--83
Anonymous Students in Computer Science and
Engineering! . . . . . . . . . . . . . . 83--83
Anonymous IEEE Computer Society Publications . . . 83--f-83--f
Anonymous IEEE Computer Society . . . . . . . . . c2--c2
Anonymous \booktitleIEEE Transactions on Software
Engineering --- Table of contents . . . c1--c1
J. P. Kearns and
C. J. Meier and
M. L. Soffa The Performance Evaluation of Control
Implementations . . . . . . . . . . . . 89--96
W. A. Abu-Sufah and
D. A. Padua Some Results on the Working Set
Anomalies in Numerical Programs . . . . 97--106
H. Samet Code Optimization Considerations in List
Processing Systems . . . . . . . . . . . 107--112
G. Harrus and
B. Plateau Queueing Analysis of a Reordering Issue 113--123
A. J. Baroody and
D. J. DeWitt The Impact of Run-Time Schema
Interpretation in a Network Data Model
DBMS . . . . . . . . . . . . . . . . . . 123--136
L. A. Rowe and
K. P. Birman A Local Network Based on the UNIX
Operating System . . . . . . . . . . . . 137--146
K. S. Shankar A Functional Approach to Module
Verification . . . . . . . . . . . . . . 147--160
Anonymous Advance Announcement \ldots Tutorial
Week East82 . . . . . . . . . . . . . . 160--160
Anonymous Call for Papers . . . . . . . . . . . . 160--160
Anonymous Call for Participation . . . . . . . . . 160--160
M. Ossefort Corrigendum to ``Proofs of Networks of
Processes'' . . . . . . . . . . . . . . 160--160
Anonymous Announcing an Important New Journal
\booktitleIEEE Transactions on Medical
Imaging . . . . . . . . . . . . . . . . 160--a-160--a
Anonymous IEEE Computer Society Publications . . . 160--e-160--e
Anonymous IEEE Computer Society Press Checklist of
New Titles December 1981 . . . . . . . . 160--d-160--d
Anonymous IEEE Computer Society . . . . . . . . . c2--c2
Anonymous \booktitleIEEE Transactions on Software
Engineering --- Table of contents . . . c1--c1
B. Bhargava Guest Editorial: Reliability Issues in
Distributed Systems . . . . . . . . . . 165--167
D. R. Ries and
G. C. Smith Nested Transactions in Distributed
Systems . . . . . . . . . . . . . . . . 167--172
T. Minoura and
G. Wiederhold Resilient Extended True-Copy Token
Scheme for a Distributed Database System 173--189
K. H. Kim Approaches to Mechanization of the
Conversation Scheme Based on Monitors 189--197
M. J. Fischer and
N. D. Griffeth and
N. A. Lynch Global States of a Distributed System 198--202
B. Liskov On Linguistic Support for Distributed
Programs . . . . . . . . . . . . . . . . 203--210
Yat-Sang Kwong and
D. Wood A New Method for Concurrency in B-Trees 211--222
G. Ozsoyoglu and
F. Y. Chin Enhancing the Security of Statistical
Databases with a Question-Answering
System and a Kernel Design . . . . . . . 223--234
C. C. Chang and
R. C. T. Lee and
M. W. Du Symbolic Gray Code as a Perfect
Multiattribute Hashing Scheme for
Partial Match Queries . . . . . . . . . 235--249
P. Zave An Operational Approach to Requirements
Specification for Embedded Systems . . . 250--269
V. R. Basili and
H. D. Mills Understanding and Documenting Programs 270--283
J. L. Reuss Macro Implementation of a Structured
Assembly Language . . . . . . . . . . . 284--287
N. Francez and
M. Rodeh Achieving Distributed Termination
without Freezing . . . . . . . . . . . . 287--292
Anonymous 1981 Referees List . . . . . . . . . . . 293--294
Anonymous Announcing The 3rd International
Conference on Distributed Computing
Systems . . . . . . . . . . . . . . . . 294--294
Anonymous Call for Papers . . . . . . . . . . . . 294--294
Anonymous IEEE Computer Society Press Checklist of
New Titles . . . . . . . . . . . . . . . 294--b-294--b
Anonymous IEEE Computer Society Publications . . . 294--c-294--c
Anonymous IEEE Computer Society . . . . . . . . . c2--c2
Anonymous \booktitleIEEE Transactions on Software
Engineering --- Table of contents . . . c1--c1
Anonymous Editorial . . . . . . . . . . . . . . . 297--297
S. Balsamo and
G. Iazeolla An Extension of Norton's Theorem for
Queueing Networks . . . . . . . . . . . 298--305
J. A. Stankovic Good System Structure Features: Their
Complexity and Execution Time Cost . . . 306--318
L. J. Siegel and
H. J. Siegel and
P. H. Swain Performance Measures for Evaluating
Algorithms for SIMD Machines . . . . . . 319--331
M. Maekawa and
Y. Morimoto Performance Adjustment of an APL
Interpreter . . . . . . . . . . . . . . 331--343
F. Bazzichi and
I. Spadafora An Automatic Generator for Compiler
Testing . . . . . . . . . . . . . . . . 343--353
C. V. Ramamoorthy and
F. B. Bastani Software Reliability --- Status and
Perspectives . . . . . . . . . . . . . . 354--371
W. E. Howden Weak Mutation Testing and Completeness
of Test Sets . . . . . . . . . . . . . . 371--379
L. A. Clarke and
J. Hassell and
D. J. Richardson A Close Look at Domain Testing . . . . . 380--390
E. J. H. Chang Echo Algorithms: Depth Parallel
Operations on General Graphs . . . . . . 391--401
T. C. K. Chou and
J. A. Abraham Load Balancing in Distributed Systems 401--412
T. C. Wesselkamper Computer Program Schemata and the
Processes They Generate . . . . . . . . 412--419
M. Dubois and
F. A. Briggs Performance of Synchronized Iterative
Processes in Multiprocessor Systems . . 419--431
F. L. Vermeulen On the Combined Problem of Compaction
and Sorting . . . . . . . . . . . . . . 432--435
J. Kontos and
G. K. Papakonstantinou The Interpretation of Meta Grammars
Describing Syntax-Directed Interpreters
Using an Attribute Grammar Interpreter 435--436
M. Lipow Number of Faults per Line of Code . . . 437--439
G. Gardarin and
M. Melkanoff Proving Consistency of Database
Transactions Written in Extended Pascal 440--446
Anonymous 6th International Conference on Software
Engineering . . . . . . . . . . . . . . 446--446
Anonymous The Second Software Engineering
Standards Applications Workshop Call for
Papers . . . . . . . . . . . . . . . . . 446--446
G. H. MacEwen Correction to ``Information Flow
Certification Using an Intermediate Code
Program Representation'' . . . . . . . . 446--446
Anonymous IEEE Computer Society Publications . . . 446--c-446--c
Anonymous IEEE Computer Society . . . . . . . . . c2--c2
Anonymous \booktitleIEEE Transactions on Software
Engineering --- Table of contents . . . c1--c1
B. G. Claybrook A Specification Method for Specifying
Data and Procedural Abstractions . . . . 449--459
C. A. Sunshine and
D. H. Thompson and
R. W. Erickson and
S. L. Gerhart and
D. Schwabe Specification and Verification of
Communication Protocols in AFFIRM Using
State Transition Models . . . . . . . . 460--489
M. S. Feather Program Specification Applied to a Text
Formatter . . . . . . . . . . . . . . . 490--498
N. C. Shu and
V. Y. Lum and
F. C. Tung and
C. L. Chang Specification of Forms Processing and
Business Procedures for Office
Automation . . . . . . . . . . . . . . . 499--512
J. L. Gieser On Horizontally Microprogrammed
Microarchitecture Description Techniques 513--525
J. Archer and
R. Conway Display Condensation of Program Text . . 526--529
S. Kundu On a Class of Linear Maps for Data
Compression . . . . . . . . . . . . . . 530--532
Anonymous Advance Announcement \ldots Tutorial
Week West82 . . . . . . . . . . . . . . 532--532
Anonymous IEEE Computer Society Publications . . . 532--a-532--a
Anonymous IEEE Computer Society . . . . . . . . . c2--c2
Anonymous \booktitleIEEE Transactions on Software
Engineering --- Table of contents . . . c1--c1
H. Boral and
D. J. Dewitt and
D. Friedland and
N. F. Jarrell and
W. K. Wilkinson Implementation of the Database Machine
DIRECT . . . . . . . . . . . . . . . . . 533--543
S. B. Yao and
V. E. Waddle and
B. C. Housel View Modeling and Integration Using the
Functional Data Model . . . . . . . . . 544--553
G. S. Ho and
C. V. Ramamoorthy Protocols for Deadlock Detection in
Distributed Database Systems . . . . . . 554--557
A. Silberschatz and
Z. M. Kedam A Family of Locking Protocols for
Database Systems that Are Modeled by
Directed Graphs . . . . . . . . . . . . 558--562
N. Roussopoulos The Logical Access Path Schema of a
Database . . . . . . . . . . . . . . . . 563--573
F. Y. Chin and
G. Ozsoyoglu Auditing and Inference Control in
Statistical Databases . . . . . . . . . 574--582
Yang-Chang Hong and
S. Y. W. Su A Mechanism for Database Protection in
Cellular-Logic Devices . . . . . . . . . 583--596
A. Lockman and
N. Minsky Unidirectional Transport of Rights and
Take--Grant Control . . . . . . . . . . 597--604
N. H. Gehani Databases and Units of Measure . . . . . 605--611
H. Mendelson Analysis of Extendible Hashing . . . . . 611--619
R. N. Horspool and
E. C. R. Hehner Comments on ``A Method for Representing
Data Items of Unlimited Length in a
Computer Memory'' . . . . . . . . . . . 620--621
Anonymous Advance Announcement \ldots Tutorial
Week West82 . . . . . . . . . . . . . . 621--621
Anonymous Call for Papers . . . . . . . . . . . . 621--621
Anonymous Call for Papers 1983 Trends and
Applications Conference . . . . . . . . 621--621
Anonymous 1982 Index \booktitleIEEE Transactions
on Software Engineering Vol. SE-18 . . . 621--621
R. L. Baber Author's reply . . . . . . . . . . . . . 621--621
Anonymous IEEE Computer Society Publications . . . 621--h-621--h
Anonymous IEEE Computer Society . . . . . . . . . c2--c2
Anonymous \booktitleIEEE Transactions on Software
Engineering --- Table of contents . . . c1--c1
R. Snodgrass An Object-Oriented Command Language . . 1--8
R. P. Cook and
T. J. Leblanc A Symbol Table Abstraction to Implement
Languages with Explicit Scope Control 8--12
D. A. Lamb and
P. N. Hilfinger Simulation of Procedure Variables Using
Ada Tasks . . . . . . . . . . . . . . . 13--15
P. Ancilotti and
M. Boari and
N. Lijtmaer Language Features for Access Control . . 16--25
J. Aoe and
Y. Yamamoto and
R. Shimada A Practical Method for Reducing Weak
Precedence Parsers . . . . . . . . . . . 25--30
L. A. Rowe and
K. A. Shoens Programming Language Constructs for
Screen Definition . . . . . . . . . . . 31--39
B. E. Jacobs and
C. A. Walczak A Generalized Query-by-Example Data
Manipulation Language Based on Database
Logic . . . . . . . . . . . . . . . . . 40--57
P. M. G. Apers and
A. R. Hevner and
S. B. Yao Optimization Algorithms for Distributed
Queries . . . . . . . . . . . . . . . . 57--68
E. J. Lau and
D. Ferrari Program Restructuring in a Multilevel
Virtual Memory . . . . . . . . . . . . . 69--79
T. Nishigaki Experiments on the Knee Criterion in a
Multiprogrammed Computer System . . . . 79--86
C. H. C. Leung Analysis of Secondary Storage
Fragmentation . . . . . . . . . . . . . 87--93
C. A. Coutant and
R. E. Griswold and
D. R. Hanson Measuring the Performance and Behavior
of Icon Programs . . . . . . . . . . . . 93--103
R. R. Oldehoeft Program Graphs and Execution Behavior 103--108
R. A. Marie and
J. M. Pellaumail Steady-State Probabilities for a Queue
with a General Service Distribution and
State-Dependent Arrivals . . . . . . . . 109--113
C. A. Sunshine and
D. H. Thompson and
R. W. Erickson and
S. L. Gerhart and
D. Schwabe Correction to ``Specification and
Verification of Communication Protocols
in AFFIRM Using State Transition
Models'' . . . . . . . . . . . . . . . . 113--113
Anonymous Information for authors . . . . . . . . 114--114
Anonymous Call for Papers . . . . . . . . . . . . 115--115
Anonymous IEEE copyright form . . . . . . . . . . 115--115
Anonymous IEEE Computer Society Publications . . . 115--b-115--b
Anonymous IEEE Computer Society . . . . . . . . . c2--c2
Anonymous \booktitleIEEE Transactions on Software
Engineering --- Table of contents . . . c1--c1
Anonymous Editorial . . . . . . . . . . . . . . . 117--117
J. D. Musa Guest Editorial: COMPSAC '81 Special
Section . . . . . . . . . . . . . . . . 118--119
L. F. Rubin Syntax-Directed Pretty Printing --- a
First Step Towards a Syntax-Directed
Editor . . . . . . . . . . . . . . . . . 119--127
J. P. Kearns and
S. DeFazio Locality of Reference in Hierarchical
Database Systems . . . . . . . . . . . . 128--134
M. Y. L. Ip and
L. V. Saxton and
V. V. Raghavan On the Selection of an Optimal Set of
Indexes . . . . . . . . . . . . . . . . 135--143
Duen-Ping Tsay and
M. T. Liu MIKE: A Network Operating System for the
Distributed Double-Loop Computer Network 143--154
V. Y. Shen and
S. D. Conte and
H. E. Dunsmore Software Science Revisited: A Critical
Analysis of the Theory and Its Empirical
Support . . . . . . . . . . . . . . . . 155--165
N. S. Coulter Software Science and Cognitive
Psychology . . . . . . . . . . . . . . . 166--171
R. M. Negrini and
M. Sami Some Properties Derived from Structural
Analysis of Program Graph Models . . . . 172--178
S. L. Getz and
G. Kalligiannis and
S. R. Schach A Very High-Level Interactive Graphical
Trace for the Pascal Heap . . . . . . . 179--185
P. Schulthess and
C. Jacobi Anatomy of a Small Pascal Compiler . . . 185--191
S. T. Redwine An Engineering Approach to Software Test
Data Design . . . . . . . . . . . . . . 191--200
J. R. Menand and
M. Becker Modeling a Multiprocessor Architecture 201--210
V. Hayward and
A. Osorio A System to Automatically Analyze
Assembled Programs . . . . . . . . . . . 210--213
Anonymous Call for Papers . . . . . . . . . . . . 213--213
Anonymous Database Engineering . . . . . . . . . . 213--213
Anonymous IEEE Computer Society Publications . . . 213--d-213--d
Anonymous Nominations Invited for IEEE Awards . . 213--b-213--c
Anonymous IEEE Computer Society . . . . . . . . . c2--c2
Anonymous \booktitleIEEE Transactions on Software
Engineering --- Table of contents . . . c1--c1
Anonymous Editorial . . . . . . . . . . . . . . . 217--217
Anonymous State-of-the-Art Issues in Distributed
Databases . . . . . . . . . . . . . . . 218--218
D. Skeen and
M. Stonebraker A Formal Model of Crash Recovery in a
Distributed System . . . . . . . . . . . 219--228
E. Wong Dynamic Rematerialization: Processing
Distributed Queries Using Redundant Data 228--232
P. A. Bernstein and
N. Goodman and
Ming-Yee Lai Analyzing Concurrency Control Algorithms
When User and System Operations Differ 233--239
D. S. Parker and
G. J. Popek and
G. Rudisin and
A. Stoughton and
B. J. Walker and
E. Walton and
J. M. Chow and
D. Edwards and
S. Kiser and
C. Kline Detection of Mutual Inconsistency in
Distributed Systems . . . . . . . . . . 240--247
J. Van Den Bos and
M. J. Plasmeijer and
P. H. Hartel Input--Output Tools: A Language Facility
for Interactive and Real-Time Systems 247--259
L. Logrippo and
D. R. Skuce File Structures, Program Structures, and
Attributed Grammars . . . . . . . . . . 260--266
N. S. Prywes and
A. Pnueli Compilation of Nonprocedural
Specifications into Computer Programs 267--279
F. G. Pagan A Diagrammatic Notation for Abstract
Syntax and Abstract Structured Objects 280--289
G. H. MacEwen The Design for a Secure System Based on
Program Analysis . . . . . . . . . . . . 289--299
D. Ferrari and
Yiu-yoo Yih VSWS: The Variable-Interval Sampled
Working Set Policy . . . . . . . . . . . 299--305
M. W. Du and
T. M. Hsieh and
K. F. Jea and
D. W. Shieh The Study of a New Perfect Hash Scheme 305--313
M. K. Sinha Nonsensitive Data and Approximate
Transactions . . . . . . . . . . . . . . 314--322
H. S. Koch and
P. Kubat Optimal Release Time of Computer
Software . . . . . . . . . . . . . . . . 323--327
P. R. McMullin and
J. D. Gannon Combining Testing with Formal
Specifications: A Case Study . . . . . . 328--335
S. J. Zeil Testing for Perturbations of Program
Statements . . . . . . . . . . . . . . . 335--346
J. W. Laski and
B. Korel A Data Flow Oriented Program Testing
Strategy . . . . . . . . . . . . . . . . 347--354
T. Anderson and
J. C. Knight A Framework for Software Fault Tolerance
in Real-Time Systems . . . . . . . . . . 355--364
R. L. Kashyap and
B. J. Oommen The Noisy Substring Matching Problem . . 365--370
J. R. Jagannathan and
R. Vasudevan Comments on ``Protocols for Deadlock
Detection in Distributed Database
Systems'' . . . . . . . . . . . . . . . 371--371
Anonymous Call for Papers . . . . . . . . . . . . 372--372
Anonymous 1982 Referees List . . . . . . . . . . . 372--372
Anonymous IEEE Computer Society Publications . . . 372--a-372--a
Anonymous IEEE Computer Society . . . . . . . . . c2--c2
Anonymous \booktitleIEEE Transactions on Software
Engineering --- Table of contents . . . c1--c1
I. T. Hawryszkiewycz A Semantic Design Method . . . . . . . . 373--384
E. D. Carlson and
J. R. Rhyne and
D. L. Weller Software Structure for Display
Management Systems . . . . . . . . . . . 385--394
J. R. White On the Multiple Implementation of
Abstract Data Types Within a Computation 395--411
I. V. Ramakrishnan and
J. C. Browne A Paradigm for the Design of Parallel
Algorithms with Applications . . . . . . 411--415
W. E. Kluge and
H. Schlutter Petri Net Models for the Evaluation of
Applicative Programs Based on $ \lambda
$-Expressions . . . . . . . . . . . . . 415--427
J. Ludewig ESPRESO --- a System for Process Control
Software Specification . . . . . . . . . 427--436
S. Jajodia and
J. Liu and
P. A. Ng A Scheme of Parallel Processing for MIMD
Systems . . . . . . . . . . . . . . . . 436--445
P. Wegner and
S. A. Smolka Processes, Tasks, and Monitors: A
Comparative Study of Concurrent
Programming Primitives . . . . . . . . . 446--462
G. Bernard Interconnection of Local Computer
Networks: Modeling and Optimization
Problems . . . . . . . . . . . . . . . . 463--470
B. Bhargava and
C. T. Hua A Causal Model for Analyzing Distributed
Concurrency Control Algorithms . . . . . 470--486
S. Ceri and
S. Navathe and
G. Wiederhold Distribution Design of Logical Database
Schemas . . . . . . . . . . . . . . . . 487--504
To-Yat Cheung Graph Traversal Techniques and the
Maximum Flow Problem in Distributed
Computation . . . . . . . . . . . . . . 504--512
L. N. Bhuyan and
D. P. Agarval Performance Analysis of FFT Algorithms
on Multiprocessor Systems . . . . . . . 512--521
R. L. Larsen and
A. K. Agrawala Control of a Heterogeneous Two-Server
Exponential Queueing System . . . . . . 522--526
A. Silberschatz Extending CSP to Allow Dynamic Resource
Management . . . . . . . . . . . . . . . 527--531
M. J. Ferguson Weighted Processor Sharing-Results for
Hyperexponential Servers . . . . . . . . 531--535
A. Silberschatz A Case for Non-Two-Phase Locking
Protocols that Ensure Atomicity . . . . 535--538
Anonymous Advance Announcement \ldots Tutorial
Week West83 . . . . . . . . . . . . . . 538--538
Anonymous Advance Program . . . . . . . . . . . . 538--538
Anonymous Call for Papers . . . . . . . . . . . . 538--538
Anonymous IEEE Computer Society Publications . . . 538--c-538--c
Anonymous IEEE Computer Society . . . . . . . . . c2--c2
Anonymous \booktitleIEEE Transactions on Software
Engineering --- Table of contents . . . c1--c1
L. L. Beck and
T. E. Perkins A Survey of Software Engineering
Practice: Tools, Methods, and Results 541--561
R. D. H. Warburton Managing and Predicting the Costs of
Real-Time Software . . . . . . . . . . . 562--569
N. G. Leveson and
P. R. Harvey Analyzing Software Safety . . . . . . . 569--579
C. L. Heitmeyer and
J. D. McLean Abstract requirements specification: A
new approach and its application . . . . 580--589
R. A. Nelson and
L. M. Haibt and
P. B. Sheridan Casting Petri Nets into Programs . . . . 590--602
J. E. Coolahan and
N. Roussopoulos Timing Requirements for Time-Driven
Systems Using Augmented Petri Nets . . . 603--616
S. Jajodia and
P. A. Ng and
F. N. Springsteel The Problem of Equivalence for
Entity-Relationship Diagrams . . . . . . 617--630
I. Kalantari and
G. McDonald A Data Structure and an Algorithm for
the Nearest Point Problem . . . . . . . 631--634
Anonymous Advance Announcement \ldots Tutorial
Week West83 . . . . . . . . . . . . . . 634--634
Anonymous Advance Program Summary Software
Maintenance Workshop . . . . . . . . . . 634--634
Anonymous Call for Papers . . . . . . . . . . . . 634--634
Anonymous IEEE Computer Society Publications . . . 634--c-634--c
Anonymous IEEE Computer Society . . . . . . . . . c2--c2
Anonymous \booktitleIEEE Transactions on Software
Engineering --- Table of contents . . . c1--c1
B. Curtis Software Metrics: Guest Editor's
Introduction . . . . . . . . . . . . . . 637--638
A. J. Albrecht and
J. E. Gaffney Software Function, Source Lines of Code,
and Development Effort Prediction: A
Software Science Validation . . . . . . 639--648
C. A. Behrens Measuring the Productivity of Computer
Systems Development Activities with
Function Points . . . . . . . . . . . . 648--652
V. R. Basili and
R. W. Selby and
T. Phillips Metric Analysis and Data Validation
Across Fortran Projects . . . . . . . . 652--663
V. R. Basili and
D. H. Hutchens An Empirical Study of a Syntactic
Complexity Family . . . . . . . . . . . 664--672
L. J. Osterweil Toolpack --- an Experimental Software
Development Environment Research Project 673--685
J. S. Gourlay A Mathematical Framework for the
Investigation of Testing . . . . . . . . 686--709
Bo-Shoe Chen and
R. T. Yeh Formal Specification and Verification of
Distributed Systems . . . . . . . . . . 710--722
K. Ramamritham and
R. M. Keller Specification of Synchronizing Processes 722--733
S. S. Yau and
M. U. Caglayan Distributed Software System Design
Representation Using Modified Petri Nets 733--745
M. Trachtenberg Order and Difficulty of Debugging . . . 746--747
Anonymous Advance Announcement Tutorial Week
East84 . . . . . . . . . . . . . . . . . 747--747
Anonymous Call for Papers Small Computer
(R)Evolution . . . . . . . . . . . . . . 747--747
Anonymous 1983 Index \booktitleIEEE Transactions
on Software Engineering Vol. SE-9 . . . 747--747
Anonymous Join Us in the Quest for Technical
Excellence . . . . . . . . . . . . . . . 747--747
Anonymous Preliminary Announcement . . . . . . . . 747--747
Anonymous IEEE Computer Society Publications . . . 747--n-747--n
Anonymous IEEE Computer Society . . . . . . . . . c2--c2
Anonymous \booktitleIEEE Transactions on Software
Engineering --- Table of contents . . . c1--c1
Anonymous Editorial . . . . . . . . . . . . . . . 1--1
Anonymous Guest Editorial: Software Engineering
Project Management . . . . . . . . . . . 2--3
B. W. Boehm Software Engineering Economics . . . . . 4--21
J. Cooper Software Development Management Planning 22--26
N. R. Howes Managing Software Development Projects
for Maximum Productivity . . . . . . . . 27--35
F. J. Buckley and
R. Poston Software Quality Assurance . . . . . . . 36--41
J. P. McGill The Software Engineering Shortage: A
Third Choice . . . . . . . . . . . . . . 42--49
W. Scacchi Managing Software Engineering Projects:
A Social Analysis . . . . . . . . . . . 49--59
W. Bryan and
S. Siegel Making Software Visible, Operational,
and Maintainable in a Small Project
Environment . . . . . . . . . . . . . . 59--67
G. M. Weinberg and
D. P. Freedman Reviews, Walkthroughs, and Inspections 68--72
M. Branstad and
P. B. Powell Software Engineering Project Standards 73--78
E. H. Bersoff Elements of Software Configuration
Management . . . . . . . . . . . . . . . 79--87
C. C. Chang and
M. W. Du and
R. C. T. Lee Performance Analyses of Cartesian
Product Files and Random Files . . . . . 88--99
F. B. Bastani Performance Improvement of Abstractions
Through Context Dependent
Transformations . . . . . . . . . . . . 100--116
J. Aoe and
Y. Yamamoto and
R. Shimada A Method for Improving String Pattern
Matching Machines . . . . . . . . . . . 116--120
Anonymous IEEE copyright form . . . . . . . . . . 121--122
Anonymous Information for authors . . . . . . . . 123--123
Anonymous Advance Announcement . . . . . . . . . . 124--124
Anonymous [Breaker page] . . . . . . . . . . . . . nil1--nil1
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous [Front cover] . . . . . . . . . . . . . c2--c2
Anonymous IEEE Computer Society . . . . . . . . . nil1--nil1
Anonymous Editorial . . . . . . . . . . . . . . . 125--125
Anonymous Foreword . . . . . . . . . . . . . . . . 126--127
C. Morgan and
B. Sufrin Specification of the UNIX Filing System 128--142
I. D. Cottam The Rigorous Development of a System
Version Control Program . . . . . . . . 143--154
F. W. Beichter and
O. Herzog and
H. Petzsch SLAN-4 --- a software specification and
design language . . . . . . . . . . . . 155--162
F. Cristian Correct and Robust Programs . . . . . . 163--174
W. M. Turski On Programming by Iterations . . . . . . 175--178
A. Silberschatz Cell: A Distributed Computing
Modularization Concept . . . . . . . . . 178--185
M. L. Wu and
T. Y. Hwang Access Control with Single-Key-Lock . . 185--191
R. H. Katz and
T. J. Lehman Database Support for Versions and
Alternatives of Large Design Files . . . 191--200
S. Christodoulakis and
C. Faloutsos Design Considerations for a Message File
Server . . . . . . . . . . . . . . . . . 201--210
H. Garcia-Molina and
F. Germano and
W. H. Kohler Debugging a Distributed Computing System 210--219
Anonymous Call for Papers . . . . . . . . . . . . 220--220
Anonymous [Front cover] . . . . . . . . . . . . . c2--c2
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous Table of contents . . . . . . . . . . . nil1--nil1
R. J. Le Blanc and
C. N. Fischer A Simple Separate Compilation Mechanism
for Block-Structured Languages . . . . . 221--227
M. S. McKendry and
R. H. Campbell Implementing Language Support in
High-Level Languages . . . . . . . . . . 227--236
M. J. Ferguson Multiaccess in a Nonqueueing Mailbox
Environment . . . . . . . . . . . . . . 237--243
A. E. Oldehoeft and
S. F. Jennings Dataflow Resource Managers and Their
Synthesis from Open Path Expressions . . 244--257
L. Svobodova Resilient Distributed Computing . . . . 257--268
C. Abbott Intervention Schedules for Real-Time
Programming . . . . . . . . . . . . . . 268--274
D. D. Dunlop and
V. R. Basili A Heuristic for Deriving Loop Functions 275--285
N. C. K. Phillips Safe Data Type Specifications . . . . . 285--289
B. W. Boehm and
T. E. Gray and
T. Seewaldt Prototyping Versus Specifying: A
Multiproject Experiment . . . . . . . . 290--303
D. L. Weller and
B. W. York A Relational Representation of an
Abstract Type System . . . . . . . . . . 303--309
D. L. Spooner and
E. Gudes A Unifying Approach to the Design of a
Secure Database Operating System . . . . 310--319
V. D. Gligor A Note on Denial-of-Service in Operating
Systems . . . . . . . . . . . . . . . . 320--324
Anonymous [Front cover] . . . . . . . . . . . . . c2--c2
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous Table of contents . . . . . . . . . . . nil1--nil1
S. S. Lam and
A. U. Shankar Protocol Verification via Projections 325--342
N. H. Gehani Broadcasting Sequential Processes (BSP) 343--351
M. Weiser Program Slicing . . . . . . . . . . . . 352--357
A. Reuter and
H. Kinzinger Automatic Design of the Internal Schema
for a CODASYL Database System . . . . . 358--375
W. K. Wiener-Ehrlich and
J. R. Hamrick and
V. F. Rupolo Modeling Software Behavior in Terms of a
Formal Life Cycle Curve: Implications
for Software Maintenance . . . . . . . . 376--383
H. G. Stuebing A Software Engineering Environment (SEE)
for Weapon System Software . . . . . . . 384--397
I. Vessey and
R. Weber Research on Structured Programming: An
Empiricist's Evaluation . . . . . . . . 397--407
T. C. Snow Use of Software Engineering Practices at
a Small MIS Shop . . . . . . . . . . . . 408--413
W. J. Stewart and
W. P. Stohs Some Equivalence Results for
Load-Independent Exponential Queueing
Networks . . . . . . . . . . . . . . . . 414--422
T. O. Alanko and
H. H. A. Erkio and
I. J. Haikala Virtual Memory Behavior of Some Sorting
Algorithms . . . . . . . . . . . . . . . 422--431
J. Jachner and
V. K. Agarwal Data Flow Anomaly Detection . . . . . . 432--437
J. W. Duran and
S. C. Ntafos An Evaluation of Random Testing . . . . 438--444
C. H. C. Leung and
Q. H. Choo On the Execution of Large Batch Programs
in Unreliable Computing Systems . . . . 444--450
R. F. Sarraga Static Data Flow Analysis of PL/I
Programs with the PROBE System . . . . . 451--459
J. E. Gaffney Estimating the Number of Faults in Code 459--464
G. D. Lakhanai and
J. S. Wang Comments on ``Optimization Algorithms
for Distributed Queries'' . . . . . . . 464--465
W. Perrizo A Method for Processing Distributed
Database Queries . . . . . . . . . . . . 466--471
Anonymous Call for Papers . . . . . . . . . . . . 472--472
Anonymous [Front cover] . . . . . . . . . . . . . c2--c2
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous Table of contents . . . . . . . . . . . nil1--nil1
Anonymous Editorial Announcement . . . . . . . . . 473--473
Anonymous Foreword . . . . . . . . . . . . . . . . 474--477
E. Horowitz and
J. B. Munson An Expansive View of Reusable Software 477--487
T. C. Jones Reusability in Programming: A Survey of
the State of the Art . . . . . . . . . . 488--494
T. A. Standish An Essay on Software Reuse . . . . . . . 494--497
R. G. Lanergan and
C. A. Grasso Software Engineering with Reusable
Designs and Code . . . . . . . . . . . . 498--501
Y. Matsumoto Some Experiences in Promoting Reusable
Software: Presentation in Higher
Abstract Levels . . . . . . . . . . . . 502--513
B. W. Kernighan The Unix System and Software Reusability 513--518
G. A. Curry and
R. M. Ayers Experience with Traits in the Xerox Star
Workstation . . . . . . . . . . . . . . 519--527
J. A. Goguen Parameterized Programming . . . . . . . 528--543
S. D. Litvintchouk and
A. S. Matsumoto Design of Ada Systems Yielding Reusable
Components: An Approach Using Structured
Algebraic Specification . . . . . . . . 544--551
T. T. Cheng and
E. D. Lock and
N. S. Prywes Use of Very High Level Languages and
Program Generation by Management
Professionals . . . . . . . . . . . . . 552--563
J. M. Neighbors The Draco Approach to Constructing
Software from Reusable Components . . . 564--574
J. M. Boyle and
M. N. Muralidharan Program Reusability through Program
Transformation . . . . . . . . . . . . . 574--588
T. E. Cheatham Reusability Through Program
Transformations . . . . . . . . . . . . 589--594
E. Soloway and
K. Ehrlich Empirical Studies of Programming
Knowledge . . . . . . . . . . . . . . . 595--609
Anonymous Call For Papers . . . . . . . . . . . . 610--612
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous [Front cover] . . . . . . . . . . . . . c2--c2
Anonymous Table of contents . . . . . . . . . . . nil1--nil1
Anonymous A Note from the Editor-in-Chief . . . . 613--613
S. Jajodia and
P. A. Ng Representative instances and $ \gamma
$-acyclic relational schemes . . . . . . 614--618
D. R. Dolk and
B. R. Konsynski Knowledge Representation for Model
Management Systems . . . . . . . . . . . 619--628
U. Dayal and
H. Y. Hwang View Definition and Generalization for
Database Integration in a Multidatabase
System . . . . . . . . . . . . . . . . . 628--645
R. Attar and
P. A. Bernstein and
N. Goodman Site Initialization, Recovery, and
Backup in a Distributed Database System 645--650
C. Batini and
M. Lenzerini A Methodology for Data Schema
Integration in the Entity Relationship
Model . . . . . . . . . . . . . . . . . 650--664
L. Lilien and
B. Bhargava A Scheme for Batch Verification of
Integrity Assertions in a Database
System . . . . . . . . . . . . . . . . . 664--680
M. Hatzopoulos and
J. G. Kollias On the Optimal Selection of Multilist
Database Structures . . . . . . . . . . 681--687
A. Iannino and
J. D. Musa and
K. Okumoto and
B. Littlewood Criteria for Software Reliability Model
Comparisons . . . . . . . . . . . . . . 687--691
K. G. Shin and
Y. H. Lee Evaluation of Error Recovery Blocks Used
for Cooperating Processes . . . . . . . 692--700
J. C. Laprie Dependability Evaluation of Software
Systems in Operation . . . . . . . . . . 701--714
C. Wong A Successful Software Development . . . 714--727
V. R. Basili and
D. M. Weiss A Methodology for Collecting Valid
Software Engineering Data . . . . . . . 728--738
N. B. Corrigan and
J. D. Starkey A Concurrent General Purpose Operator
Interface . . . . . . . . . . . . . . . 738--748
A. Ben-David and
M. I. Ben-Porath and
J. Z. Loeb and
M. Rich An Industrial Software Engineering
Retraining Course: Development
Considerations and Lessons Learned . . . 748--755
B. Plattner Real-Time Execution Monitoring . . . . . 756--764
S. M. German Monitoring for Deadlock and Blocking in
Ada Tasking . . . . . . . . . . . . . . 764--777
U. Manber Concurrent Maintenance of Binary Search
Trees . . . . . . . . . . . . . . . . . 777--784
D. B. Benson Counting Paths: Nondeterminism as Linear
Algebra . . . . . . . . . . . . . . . . 785--794
S. C. Ntafos On Required Element Testing . . . . . . 795--803
M. G. Khayat A Concurrency Measure . . . . . . . . . 804--810
D. W. Leinbaugh Selectors: High-Level Resource
Schedulers . . . . . . . . . . . . . . . 810--825
T. Higashino and
M. Mori and
Y. Sugiyama and
K. Taniguchi and
T. Kasami An Algebraic Specification of HDLC
Procedures and Its Verification . . . . 825--836
G. Serazzi and
M. Calzarossa Adaptive Optimization of a System's Load 837--845
M. G. Gouda Closed Covers: To Verify Progress for
Communicating Finite State Machines . . 846--855
H. Kameda A Property of Normalization Constants
for Closed Queueing Networks . . . . . . 856--857
Anonymous 1984 Index \booktitleIEEE Transactions
on Software Engineering . . . . . . . . 858--862
Anonymous Call for papers . . . . . . . . . . . . 863--864
Anonymous [Front cover] . . . . . . . . . . . . . c2--c2
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous Table of contents . . . . . . . . . . . nil1--nil1
Anonymous Editorial . . . . . . . . . . . . . . . 1--2
B. G. Claybrook and
A. M. Claybrook and
J. Williams Defining Database Views as Data
Abstractions . . . . . . . . . . . . . . 3--14
C. Mohan and
D. Fussell and
Z. M. Kedem and
A. Silberschatz Lock Conversion in Non-Two-Phase Locking
Protocols . . . . . . . . . . . . . . . 15--22
F. Cristian A Rigorous Approach to Fault-Tolerant
Programming . . . . . . . . . . . . . . 23--31
R. A. Kemmerer Testing Formal Specifications to Detect
Design Errors . . . . . . . . . . . . . 32--43
G. T. Almes and
A. P. Black and
E. D. Lazowska and
J. D. Noe The Eden System: A Technical Review . . 43--59
M. Ahamad and
A. J. Bernstein An Application of Name Based Addressing
to Low Level Distributed Algorithms . . 59--67
M. K. Sinha and
N. Natarajan A Priority Based Distributed Deadlock
Detection Algorithm . . . . . . . . . . 67--80
B. Dasarathy Timing Constraints of Real-Time Systems:
Constructs for Expressing Them, Methods
of Validating Them . . . . . . . . . . . 80--86
D. B. Lomet Making Pointers Safe in System
Programming Languages . . . . . . . . . 87--96
M. Jarke and
J. A. Tuner and
E. A. Stohr and
Y. Vassiliou and
N. H. White and
K. Michielsen A Field Evaluation of Natural Language
for Data Retrieval . . . . . . . . . . . 97--114
J. Cohen and
S. Kolodner Estimating the Speedup in Parallel
Parsing . . . . . . . . . . . . . . . . 114--124
M. O. Fryer Risk Assessment of Computer Controlled
Systems . . . . . . . . . . . . . . . . 125--129
G. Harrus A Model for the Basic Block Protocol of
the Cambridge Ring . . . . . . . . . . . 130--136
A. Pashtan Operating System Models in a Concurrent
Pascal Environment: Complexity and
Performance Considerations . . . . . . . 136--141
Anonymous Call for papers . . . . . . . . . . . . 142--142
Anonymous Information for authors . . . . . . . . 143--143
Anonymous IEEE copyright form . . . . . . . . . . 143--143
Anonymous IEEE Computer Society Publications . . . 143--b-143--b
Anonymous IEEE Computer Society . . . . . . . . . c2--c2
Anonymous \booktitleIEEE Transactions on Software
Engineering --- Table of contents . . . c1--c1
D. L. Tuomenoksa and
H. J. Siegel Task Scheduling on the PASM Parallel
Processing System . . . . . . . . . . . 145--157
D. M. Weiss and
V. R. Basili Evaluating Software Development by
Analysis of Changes: Some Data from the
Software Engineering Laboratory . . . . 157--168
I. J. Hayes Applying Formal Specification to
Software Development in Industry . . . . 169--178
T. Yuasa and
R. Nakajima IOTA: A Modular Programming System . . . 179--187
J. B. Peachey and
R. B. Bunt and
C. J. Colbourn Some Empirical Observations on Program
Behavior with Applications to Program
Restructuring . . . . . . . . . . . . . 188--193
S. Balsamo and
G. Iazeolla Product-Form Synthesis of Queueing
Networks . . . . . . . . . . . . . . . . 194--199
S. Muro and
T. Ibaraki and
H. Miyajima and
T. Hasegawa Evaluation of the File Redundancy in
Distributed Database Systems . . . . . . 199--205
A. Chan and
R. Gray Implementing Distributed Read-Only
Transactions . . . . . . . . . . . . . . 205--212
Hung-Chang Du On the File Design Problem for Partial
Match Retrieval . . . . . . . . . . . . 213--222
R. K. Iyer and
P. Velardi Hardware-Related Software Errors:
Measurement and Analysis . . . . . . . . 223--231
H. A. Jensen and
K. Vairavan An Experimental Study of Software
Metrics for Real-Time Software . . . . . 231--234
E. G. Coffman and
T. T. Kadota and
L. A. Shepp On the Asymptotic Optimality of
First-Fit Storage Allocation . . . . . . 235--239
Anonymous Call for papers . . . . . . . . . . . . 240--240
Anonymous Call for Papers and Panel Session
Proposals . . . . . . . . . . . . . . . 240--240
Anonymous IEEE Computer Society Publications . . . 240--a-240--a
Anonymous IEEE Computer Society . . . . . . . . . c2--c2
Anonymous \booktitleIEEE Transactions on Software
Engineering --- Table of contents . . . c1--c1
W. E. Howden Foreword . . . . . . . . . . . . . . . . 241--241
M. Bidoit and
B. Biebow and
M. C. Gaudel and
C. Gresse and
G. D. Guiho Exception Handling: Formal Specification
and Systematic Program Construction . . 242--252
S. W. Draper and
D. A. Norman Software Engineering for User Interfaces 252--258
D. L. Parnas and
P. C. Clements and
D. M. Weiss The Modular Structure of Complex Systems 259--266
W. L. Johnson and
E. Soloway PROUST: Knowledge-Based Program
Understanding . . . . . . . . . . . . . 267--275
S. P. Reiss PECAN: Program Development Systems that
Support Multiple Views . . . . . . . . . 276--285
W. Teitelman A Tour Through Cedar . . . . . . . . . . 285--302
R. N. Taylor and
T. A. Standish Steps to an Advanced Ada$^1$ Programming
Environment . . . . . . . . . . . . . . 302--310
Anonymous Advance Program . . . . . . . . . . . . 311--313
Anonymous Call for papers . . . . . . . . . . . . 314--314
Anonymous Call for Papers and Panel Session
Proposals . . . . . . . . . . . . . . . 315--315
Anonymous Information for authors . . . . . . . . 315--315
Anonymous Beyond the Basics: A Software
Publication Series for Successful
Computer Professionals From the IEEE
Computer Society . . . . . . . . . . . . 315--a-315--a
Anonymous IEEE Computer Society Publications . . . 315--b-315--b
Anonymous IEEE Computer Society . . . . . . . . . c2--c2
Anonymous \booktitleIEEE Transactions on Software
Engineering --- Table of contents . . . c1--c1
V. Y. Shen and
Tze-jie Yu and
S. M. Thebaut and
L. R. Paulsen Identifying Error-Prone Software --- an
Empirical Study . . . . . . . . . . . . 317--324
S. Ceri and
G. Gottlob Translating SQL Into Relational Algebra:
Optimization, Semantics, and Equivalence
of SQL Queries . . . . . . . . . . . . . 324--345
A. Thomasian Performance Evaluation of Centralized
Databases with Static Locking . . . . . 346--355
N. Roussopoulos and
R. T. Yeh SEES --- a Software testing Environment
Support System . . . . . . . . . . . . . 355--366
S. Rapps and
E. J. Weyuker Selecting Software Test Data Using Data
Flow Information . . . . . . . . . . . . 367--375
T. Downs An Approach to the Modeling of Software
Testing with Some Applications . . . . . 375--386
D. E. Comer and
N. H. Gehani Flex: A High-Level Language for
Specifying Customized Microprocessors 387--396
N. Natarajan Communication and Synchronization
Primitives for Distributed Programs . . 396--416
M. K. Molloy Discrete Time Stochastic Petri Nets . . 417--423
J. Kramer and
J. Magee Dynamic Configuration for Distributed
Systems . . . . . . . . . . . . . . . . 424--436
Ching-Chy Wang and
M. L. Soffa Eager Reclamation . . . . . . . . . . . 437--439
F. Luccio Variations on a Method for Representing
Data Items of Unlimited Length . . . . . 439--441
Anonymous Call for Papers . . . . . . . . . . . . 442--442
Anonymous IEEE copyright form . . . . . . . . . . 443--443
Anonymous Beyond the Basics: A Software
Publication Series for Successful
Computer Professionals From the IEEE
Computer Society . . . . . . . . . . . . 443--c-443--c
Anonymous IEEE Computer Society Publications . . . 443--b-443--b
Anonymous IEEE Computer Society . . . . . . . . . c2--c2
Anonymous \booktitleIEEE Transactions on Software
Engineering --- Table of contents . . . c1--c1
Anonymous Editorial . . . . . . . . . . . . . . . 445--445
A. J. Bernstein A Loosely Coupled Distributed System for
Reliably Storing Data . . . . . . . . . 446--454
D. B. MacQueen and
D. T. Sannella Completeness of Proof Systems for
Equational Specifications . . . . . . . 454--461
M. K. Sinha Atomic Actions and Resource Coordination
Problems Having Nonunique Solutions . . 461--471
R. H. Perrott and
D. Crookes and
P. Milligan and
W. R. M. Purdy A Compiler for an Array and Vector
Processing Language . . . . . . . . . . 471--478
S. M. Ross Statistical Estimation of Software
Reliability . . . . . . . . . . . . . . 479--483
G. Martella and
B. Pernici and
F. A. Schreiber An Availability Model for Distributed
Transaction Systems . . . . . . . . . . 483--491
L. M. Ni and
Kai Hwang Optimal Load Balancing in a Multiple
Processor System with Many Job Classes 491--496
Anonymous Call for Papers . . . . . . . . . . . . 496--496
Anonymous Beyond the Basics: A Software
Publication Series for Successful
Computer Professionals From the IEEE
Computer Society . . . . . . . . . . . . 496--b-496--b
Anonymous IEEE Computer Society Publications . . . 496--a-496--a
Anonymous IEEE Computer Society . . . . . . . . . c2--c2
Anonymous \booktitleIEEE Transactions on Software
Engineering --- Table of contents . . . c1--c1
V. D. Gligor and
P. A. B. Ng Foreword . . . . . . . . . . . . . . . . 497--501
K. P. Birman and
T. A. Joseph and
T. Raeuchle and
A. El Abbadi Implementing Fault-Tolerant Distributed
Objects . . . . . . . . . . . . . . . . 502--508
M. S. Mckendry Ordering Actions for Visibility . . . . 509--519
A. Z. Spector and
J. Butcher and
D. S. Daniels and
D. J. Duchamp and
J. L. Eppinger and
C. E. Fineman and
A. Heddaya and
P. M. Schwarz Support for Distributed Transactions in
the TABS Prototype . . . . . . . . . . . 520--530
B. Chor and
B. A. Coan A Simple and Efficient Randomized
Byzantine Agreement Algorithm . . . . . 531--539
K. J. Perry Randomized Byzantine Agreement . . . . . 539--546
O. Babao\uglu and
R. Drummond Streets of Byzantium: Network
Architectures for Fast Reliable
Broadcasts . . . . . . . . . . . . . . . 546--554
R. D. Schlichting A Technique for Estimating Performance
of Fault-Tolerant Programs . . . . . . . 555--563
N. Griffyth and
J. A. Miller Performance Modeling of Database
Recovery Protocols . . . . . . . . . . . 564--572
Anonymous Call for Papers . . . . . . . . . . . . 572--572
Anonymous Information for authors . . . . . . . . 572--572
Anonymous IEEE Computer Society Publications . . . 572--a-572--a
Anonymous IEEE Computer Society . . . . . . . . . c2--c2
Anonymous \booktitleIEEE Transactions on Software
Engineering --- Table of contents . . . c1--c1
P. B. Berra Foreword Computers Come and Go But Data
Go On Forever . . . . . . . . . . . . . 573--573
R. P. Braegger and
A. M. Dudler and
J. Rebsamen and
C. A. Zehnder Gambit: An Interactive Database Design
Tool for Data Structures, Integrity
Constraints, and Transactions . . . . . 574--583
D. B. Farmer and
R. King and
D. A. Myers The Semantic Database Constructor . . . 583--591
S. P. Ghosh An Application of Statistical Databases
in Manufacturing Testing . . . . . . . . 591--598
S. D. Urban and
J. E. Urban and
W. D. Dominick Utilizing an Executable Specification
Language for an Information System . . . 598--605
B. W. Wah and
Yao-Nan Lien Design of Distributed Databases on Local
Computer Systems with a Multiaccess
Network . . . . . . . . . . . . . . . . 606--619
A. M. Keller and
M. W. Wilkins On the Use of an Extended Relational
Model to Handle Changing Incomplete
Information . . . . . . . . . . . . . . 620--633
C. Parent and
S. Spaccapietra An Algebra for a General
Entity-Relationship Model . . . . . . . 634--643
D. Maier and
D. Rozenshtein and
J. Stein Representing Roles in Universal Scheme
Interfaces . . . . . . . . . . . . . . . 644--652
Anonymous Call for papers . . . . . . . . . . . . 653--653
Anonymous Tutorial Week Washington 1985 . . . . . 654--654
Anonymous IEEE copyright form . . . . . . . . . . 655--655
Anonymous Beyond The Basics: A Software
Publication Series for Successful
Computer Professionals From the IEEE
Computer Society . . . . . . . . . . . . 655--c-655--c
Anonymous IEEE Computer Society Publications . . . 655--b-655--b
Anonymous IEEE Computer Society . . . . . . . . . c2--c2
Anonymous \booktitleIEEE Transactions on Software
Engineering --- Table of contents . . . c1--c1
V. Berzins and
M. Gray Analysis and Design in MSG.84:
Formalizing Functional Specifications 657--670
U. H. Chi Formal Specification of User Interfaces:
A Comparison and Evaluation of Four
Axiomatic Approaches . . . . . . . . . . 671--685
L. J. Bass An Approach to User Specification of
Interactive Display Interfaces . . . . . 686--698
A. I. Wasserman Extending State Transition Diagrams for
the Specification of Human--Computer
Interaction . . . . . . . . . . . . . . 699--713
J. Gait An Aspect of Aesthetics in
Human--Computer Communications: Pretty
Windows . . . . . . . . . . . . . . . . 714--717
F. B. Bastani Experiences with a Feedback Version
Development Methodology . . . . . . . . 718--723
Shi-Kuo Chang and
Wu-Lung Chan Transformation and Verification of
Office Procedures . . . . . . . . . . . 724--734
A. Mili Towards a Theory of Forward Error
Recovery . . . . . . . . . . . . . . . . 735--748
D. H. Hutchens and
V. R. Basili System Structure Analysis: Clustering
with Data Bindings . . . . . . . . . . . 749--757
A. Gabrielian and
L. P. McNamee and
D. J. Trawick The Qualified Function Approach to
Analysis of Program Behavior and
Performance . . . . . . . . . . . . . . 758--773
K. Ramamritham Synthesizing Code for Resource
Controllers . . . . . . . . . . . . . . 774--783
V. Ambriola and
F. Giannotti and
D. Pedreschi and
F. Turini Symbolic Semantics and Program Reduction 784--794
C. T. Yu and
C. C. Chang and
M. Templeton and
D. Brill and
E. Lund Query Processing in a Fragmented
Relational Distributed System: Mermaid 795--810
Shi-Kuo Chang and
E. Jungert and
S. Levialdi and
G. Tortora and
T. Ichikawa An Image Processing Language with
Icon-Assisted Navigation . . . . . . . . 811--819
G. T. Wuu and
A. J. Bernstein False Deadlock Detection in Distributed
Systems . . . . . . . . . . . . . . . . 820--821
E. H. Bersoff Comments on ``Elements of Software
Configuration Management'' . . . . . . . 822--822
M. G. Khayat and
W. S. Breger and
M. Freiling and
T. G. Lewis Correction to ``A Concurrency Measure'' 822--822
Anonymous Call for papers . . . . . . . . . . . . 823--823
Anonymous Beyond the Basics: A Software
Publication Series for Successful
Computer Professionals From the IEEE
Computer Society . . . . . . . . . . . . 823--c-823--c
Anonymous IEEE Computer Society Publications . . . 823--b-823--b
Anonymous Tutorial Week Washington 1985 . . . . . 823--a-823--a
Anonymous IEEE Computer Society . . . . . . . . . c2--c2
Anonymous \booktitleIEEE Transactions on Software
Engineering --- Table of contents . . . c1--c1
B. D. Shriver An Introduction to \booktitleIEEE
Software . . . . . . . . . . . . . . . . 829--829
Anonymous \booktitleIEEE Software . . . . . . . . 829--a-829--d
N. L. Marselos Foreword Technical Conferences: A Window
to the Future . . . . . . . . . . . . . 830--831
C. Wilson and
L. J. Osterweil Omega --- a Data Flow Analysis Tool for
the C Programming Language . . . . . . . 832--838
R. Troy and
R. Moawad Assessment of Software Reliability
Models . . . . . . . . . . . . . . . . . 839--849
S. S. Yau and
J. S. Collofello Design Stability Measures for Software
Maintenance . . . . . . . . . . . . . . 849--856
F. B. Bastani On the Uncertainty in the Correctness of
Computer Programs . . . . . . . . . . . 857--864
L. Lilien and
B. Bhargava Database Integrity Block Construct:
Concepts and Design Issues . . . . . . . 865--885
C. V. Ramamoorthy and
S. T. Dong and
Y. Usuda An Implementation of an Automated
Protocol Synthesizer (APS) and Its
Application to the X.21 Protocol . . . . 886--908
H. M. Sneed and
A. Merey Automated Software Quality Assurance . . 909--916
T. J. Mc Cabe and
G. G. Schulmeyer System Testing Aided by Structured
Analysis: A Practical Experience . . . . 917--921
B. W. Wah and
Chee Fen Yu Stochastic Modeling of Branch-and-Bound
Algorithms with Best-First Search . . . 922--934
M. S. Karasik Environmental Testing Techniques for
Software Certification . . . . . . . . . 934--938
B. P. Mc Cune and
R. M. Tong and
J. S. Dean and
D. G. Shapiro RUBRIC: A System for Rule-Based
Information Retrieval . . . . . . . . . 939--945
M. Azuma and
T. Tabata and
Y. Oki and
S. Kamiya SPD: A Humanized Documentation
Technology . . . . . . . . . . . . . . . 945--953
M. Yoshida and
K. Mizumachi and
A. Wakino and
I. Oyake and
Y. Matsushita Time and Cost Evaluation Schemes of
Multiple Copies of Data in Distributed
Database Systems . . . . . . . . . . . . 954--959
C. T. Yu and
Man-Keung Siu and
K. Lam and
C. H. Chen Adaptive File Allocation in Star
Computer Network . . . . . . . . . . . . 959--965
C. R. Carlson and
A. K. Arora Toward the Next Generation of Data
Modeling Tools . . . . . . . . . . . . . 966--970
C. L. Cline and
H. J. Siegel Augmenting Ada for SIMD Parallel
Processing . . . . . . . . . . . . . . . 970--977
C. W. Doerflinger and
V. R. Basili Monitoring Software Development Through
Dynamic Variables . . . . . . . . . . . 978--985
D. Keirsey and
J. Mitchell and
B. Bullock and
T. Nussmeir and
D. Y. Tseng Autonomous Vehicle Control Using Al
Techniques . . . . . . . . . . . . . . . 986--992
Anonymous Call for Papers . . . . . . . . . . . . 992--992
Anonymous Beyond The Basics: A Software
Publication Series for Successful
Computer Professionals From the IEEE
Computer Society . . . . . . . . . . . . 992--b-992--b
Anonymous IEEE Computer Society Publications . . . 992--a-992--a
Anonymous IEEE Computer Society . . . . . . . . . c2--c2
Anonymous \booktitleIEEE Transactions on Software
Engineering --- Table of contents . . . c1--c1
Anonymous Editorial . . . . . . . . . . . . . . . 993--993
A. H. Konstam and
D. E. Wood Software Science Applied to APL . . . . 994--1000
C. P. Kruskal and
A. Weiss Allocating Independent Subtasks on
Parallel Processors . . . . . . . . . . 1001--1016
F. Panzieri and
B. Randell Interfacing UNIX to Data Communications
Networks . . . . . . . . . . . . . . . . 1016--1032
R. Ford and
K. Miller Abstract Data Type Development and
Implementation: An Example . . . . . . . 1033--1037
H. K. T. Wong Foreword . . . . . . . . . . . . . . . . 1038--1039
A. Shoshani and
H. K. T. Wong Statistical and Scientific Database
Issues . . . . . . . . . . . . . . . . . 1040--1047
M. A. Bassiouni Data Compression in Scientific and
Statistical Databases . . . . . . . . . 1047--1058
S. N. Khoshafian and
D. M. Bates and
D. J. De Witt Efficient Support of Statistical
Operations . . . . . . . . . . . . . . . 1058--1070
G. Ozsoyoglu and
Z. M. Ozsoyoglu Statistical Database Query Languages . . 1071--1081
N. C. Rowe Antisampling for Estimation: An Overview 1081--1091
S. F. Lundstrom and
E. E. Swartzlander Foreword Advances in Distributed
Computing Systems . . . . . . . . . . . 1092--1096
A. L. P. Chen and
V. O. K. Li An Optimal Algorithm for Processing
Distributed Star Queries . . . . . . . . 1097--1107
D. M. Topkis Concurrent Broadcast for Information
Dissemination . . . . . . . . . . . . . 1107--1112
J. P. Huang Modeling of Software Partition for
Distributed Real-Time Applications . . . 1113--1126
Kwei-Jay Lin and
J. D. Gannon Atomic Remote Procedure Call . . . . . . 1126--1135
B. Szymanski and
Yuan Shi and
N. S. Prywes Synchronized Distributed Termination . . 1136--1140
J. A. Stankovic Stability and Distributed Scheduling
Algorithms . . . . . . . . . . . . . . . 1141--1152
L. M. Ni and
Chong-Wei Xu and
T. B. Gendreau A Distributed Drafting Algorithm for
Load Balancing . . . . . . . . . . . . . 1153--1161
K. A. Lantz and
W. I. Nowicki and
A. M. Theimer An Empirical Study of Distributed
Application Performance . . . . . . . . 1162--1174
A. P. Sheth and
A. Singhal and
M. T. Liu An Analysis of the Effect of Network
Parameters on the Performance of
Distributed Database Systems . . . . . . 1174--1184
C. S. Raghavendra and
S. Hariri Reliability Optimization in the Design
of Distributed Systems . . . . . . . . . 1184--1193
S. M. Shatz Post-Failure Reconfiguration of CSP
Programs . . . . . . . . . . . . . . . . 1193--1202
A. Thomasian and
P. F. Bay Integrated Performance Models for
Distributed Processing in Computer
Communication Networks . . . . . . . . . 1203--1216
K. Garg An Approach to Performance Specification
of Communication Protocols Using Timed
Petri Nets . . . . . . . . . . . . . . . 1216--1225
M. T. Ozsu Modeling and Analysis of Distributed
Database Concurrency Control Algorithms
Using an Extended Petri Net Formalism 1225--1240
M. G. Gouda and
Hui-Seng Lee Proving Liveness and Termination of
Systolic Arrays Using Communicating
Finite State Machines . . . . . . . . . 1240--1251
Anonymous Call for papers . . . . . . . . . . . . 1252--1252
Anonymous IEEE Computer Society Publications . . . 1252--a-1252--a
Anonymous \booktitleIEEE Transactions on Software
Engineering --- Table of contents . . . c1--1252
Anonymous IEEE Computer Society . . . . . . . . . c2--c2
J. Mostow Foreword What is AI? And What Does It
Have to Do with Software Engineering? 1253--1256
R. Balzer A 15 Year Perspective on Automatic
Programming . . . . . . . . . . . . . . 1257--1268
S. F. Fickas Automating the Transformational
Development of Software . . . . . . . . 1268--1277
D. R. Smith and
G. B. Kotik and
S. J. Westfold Research on Knowledge-Based Software
Environments at Kestrel Institute . . . 1278--1295
R. C. Waters The Programmer's Apprentice: A Session
with KBEmacs . . . . . . . . . . . . . . 1296--1320
D. R. Barstow Domain-Specific Automatic Programming 1321--1336
R. Neches and
W. R. Swartout and
J. D. Moore Enhanced Maintenance and Explanation of
Expert Systems Through Explicit Models
of Their Development . . . . . . . . . . 1337--1351
B. Adelson and
E. Soloway The Role of Domain Experience in
Software Design . . . . . . . . . . . . 1351--1360
E. Kant Understanding and Automating Algorithm
Design . . . . . . . . . . . . . . . . . 1361--1374
D. M. Steier and
E. Kant The Roles of Execution and Analysis in
Algorithm Design . . . . . . . . . . . . 1375--1386
J. Doyle Expert Systems and the ``Myth'' of
Symbolic Reasoning . . . . . . . . . . . 1386--1390
P. A. Subrahmanyam The ``Software Engineering'' of Expert
Systems: Is Prolog Appropriate? . . . . 1391--1400
D. G. Bobrow If Prolog is the Answer, What is the
Question? or What it Takes to Support AI
Programming Paradigms . . . . . . . . . 1401--1408
Anonymous Call for Papers . . . . . . . . . . . . 1408--1408
Anonymous IEEE Computer Society Publications . . . 1408--a-1408--a
Anonymous IEEE Computer Society . . . . . . . . . c2--c2
Anonymous \booktitleIEEE Transactions on Software
Engineering --- Table of contents . . . c1--c1
A. L. Goel and
F. B. Bastani Foreword Software Reliability . . . . . 1409--1410
Anonymous List of referees . . . . . . . . . . . . 1410--1410
A. L. Goel Software Reliability Models:
Assumptions, Limitations, and
Applicability . . . . . . . . . . . . . 1411--1423
K. Okumoto A Statistical Method for Software
Quality Control . . . . . . . . . . . . 1424--1430
S. Yamada and
S. Osaki Software Reliability Growth Modeling:
Models and Applications . . . . . . . . 1431--1437
R. K. Iyer and
D. J. Rossetti Effect of System Workload on Operating
System Reliability: A Study on IBM 3081 1438--1448
J. P. Cavano Toward High Confidence Software . . . . 1449--1455
N. D. Singpurwalla and
R. Soyer Assessing (Software) Reliability Growth
Using a Random Coefficient
Autoregressive Process and Its
Ramifications . . . . . . . . . . . . . 1456--1464
W. S. Jewell Bayesian Extensions to a Basic Model of
Software Reliability . . . . . . . . . . 1465--1471
S. M. Ross Software Reliability: The Stopping Rule
Problem . . . . . . . . . . . . . . . . 1472--1476
D. J. Richardson and
L. A. Clarke Partition Analysis: A Method Combining
Testing and Verification . . . . . . . . 1477--1490
A. Avizienis The $N$-Version Approach to
Fault-Tolerant Software . . . . . . . . 1491--1501
T. Anderson and
P. A. Barrett and
D. N. Halliwell and
M. R. Moulding Software Fault Tolerance: An Evaluation 1502--1510
D. E. Eckhardt and
L. D. Lee A Theoretical Basis for the Analysis of
Multiversion Software Subject to
Coincident Errors . . . . . . . . . . . 1511--1517
Anonymous Call for Papers . . . . . . . . . . . . 1517--1517
Anonymous Call for Papers . . . . . . . . . . . . 1517--1517
Anonymous 1985 Index \booktitleIEEE Transactions
on Software Engineering Vol. SE-11 . . . 1517--1517
Anonymous IEEE Computer Society Publications . . . 1517--l-1517--l
Anonymous IEEE Finding Your Way . . . . . . . . . 1517--j-1517--j
Anonymous IEEE Computer Society . . . . . . . . . c2--c2
Anonymous \booktitleIEEE Transactions on Software
Engineering --- Table of contents . . . c1--c1
Anonymous Contents . . . . . . . . . . . . . . . . 1--1
Anonymous IEEE copyright form . . . . . . . . . . 1--2
A. L. Goel and
F. B. Bastani Foreword software reliability . . . . . 1--2
P. A. Currit and
M. Dyer and
H. D. Mills Certifying the reliability of software 3--11
D. R. Miller Exponential order statistic models of
software reliability growth . . . . . . 12--24
F. W. Scholz Software reliability modeling and
analysis . . . . . . . . . . . . . . . . 25--31
U. Sumita and
Y. Masuda Analysis of software
availability/reliability under the
influence of hardware failures . . . . . 32--41
V. K. P. Kumar and
S. Hariri and
C. S. Raghavendra Distributed program reliability analysis 42--50
H. Hecht and
M. Hecht Software reliability in the system
context . . . . . . . . . . . . . . . . 51--58
P. Jalote and
R. H. Campbell Atomic actions for fault-tolerance using
CSP . . . . . . . . . . . . . . . . . . 59--68
D. J. Taylor Concurrency and forward recovery in
atomic actions . . . . . . . . . . . . . 69--78
L. Mancini Modular redundancy in a message passing
system . . . . . . . . . . . . . . . . . 79--86
J. S. Upadhyaya and
K. K. Saluja A watchdog processor based general
rollback technique with multiple retries 87--95
J. C. Knight and
N. G. Leveson An experimental evaluation of the
assumption of independence in
multiversion programming . . . . . . . . 96--109
J. R. Dunham Experiments in software reliability:
Life-critical applications . . . . . . . 110--123
I. J. Hayes Specification directed module testing 124--133
H. Tsubotani and
N. Monden and
M. Tanaka and
T. Ichikawa A high level language-based computing
environment to support production and
execution of reliable programs . . . . . 134--146
A. I. Wasserman and
P. A. Pircher and
D. T. Shewmake Building reliable interactive
information systems . . . . . . . . . . 147--156
R. E. Strom and
S. Yemini Typestate: A programming language
concept for enhancing software
reliability . . . . . . . . . . . . . . 157--171
Z. L. Lichtman Generation and consistency checking of
design and program structures . . . . . 172--181
Anonymous Call for papers . . . . . . . . . . . . 182--182
Anonymous [Inside front cover] . . . . . . . . . . c2--c2
Anonymous Ada --- applications and environments 1--1
Anonymous Call for papers . . . . . . . . . . . . 1--1
G. D. Bergland and
P. Zave Guest Editors' prologue special issue on
software design methods . . . . . . . . 185--191
H. D. Mills and
R. C. Linger Data structured programming: Program
design without arrays and pointers . . . 192--197
P. T. Ward The transformation schema: An extension
of the data flow diagram to represent
control and timing . . . . . . . . . . . 198--210
G. Booch Object-oriented development . . . . . . 211--221
J. R. Cameron An overview of JSD . . . . . . . . . . . 222--240
P. Henderson Functional programming, formal
specification, and rapid prototyping . . 241--250
D. L. Parnas and
P. C. Clements A rational design process: How and why
to fake it . . . . . . . . . . . . . . . 251--257
H. J. Barnard and
R. F. Metz and
A. L. Price A recommended practice for describing
software designs: IEEE standards project
1016 . . . . . . . . . . . . . . . . . . 258--263
D. N. Card and
V. E. Church and
W. W. Agresti An empirical study of software design
practices . . . . . . . . . . . . . . . 264--271
L. S. Levy A metaprogramming method and its
economic justification . . . . . . . . . 272--277
G. S. Avrunin and
L. K. Dillon and
J. C. Wileden and
W. E. Riddle Constrained expressions: Adding analysis
capabilities to design methods for
concurrent software systems . . . . . . 278--292
G. Estrin and
R. S. Fenchel and
R. R. Razouk and
M. K. Vernon SARA (System ARchitects Apprentice):
Modeling, analysis, and simulation
support for design of concurrent systems 293--311
P. Zave and
W. Schell Salient features of an executable
specification language and its
environment . . . . . . . . . . . . . . 312--325
A. I. Wasserman and
P. A. Pircher and
D. T. Shewmake and
M. L. Kersten Developing interactive information
systems with the User Software
Engineering methodology . . . . . . . . 326--345
G. Bruno and
G. Marchetto Process-translatable Petri nets for the
rapid prototyping of process control
systems . . . . . . . . . . . . . . . . 346--357
J. S. Tseng and
B. Szymanski and
Y. Shi and
N. S. Prywes Real-time software life cycle with the
model system . . . . . . . . . . . . . . 358--373
Anonymous Call for papers . . . . . . . . . . . . 374--374
Anonymous Call for papers . . . . . . . . . . . . 1--1
Anonymous Call for papers . . . . . . . . . . . . 1--1
Anonymous Call for papers . . . . . . . . . . . . 1--1
S. Rutenstreich and
W. E. Howden Two-dimensional program design . . . . . 377--384
K. Schwan and
A. K. Jones Flexible software development for
multiple computer systems . . . . . . . 385--401
F. J. Polster Reuse of software through generation of
partial systems . . . . . . . . . . . . 402--416
G. D. Kimura A structure editor for abstract document
objects . . . . . . . . . . . . . . . . 417--435
C. H. C. Leung Dynamic storage fragmentation and file
deterioration . . . . . . . . . . . . . 436--441
A. Moitra and
S. S. Iyengar Derivation of a parallel algorithm for
balancing binary trees . . . . . . . . . 442--449
H. G. Perros and
T. Altiok Approximate analysis of open networks of
queues with blocking: Tandem
configurations . . . . . . . . . . . . . 450--461
M. K. Sinha Commutable transactions and the
time\_pad synchronization mechanism for
distributed systems . . . . . . . . . . 462--476
K. J. Perry and
S. Toueg Distributed agreement in the presence of
processor and communication faults . . . 477--482
B. Indurkhya and
H. S. Stone and
L. Xi-Cheng Optimal partitioning of randomly
generated distributed programs . . . . . 483--495
J. E. Gaffney The impact on software development costs
of using HOL's . . . . . . . . . . . . . 496--499
L. M. Ni and
K. Hwang Correction to ``Optimal load balancing
in a multiple processor system with many
job classes'' . . . . . . . . . . . . . 500--500
Anonymous Call for papers . . . . . . . . . . . . 502--502
Anonymous Call for papers . . . . . . . . . . . . 1--1
G. S. Hura and
H. Singh and
N. K. Nanda Some design aspects of databases through
Petri net modeling . . . . . . . . . . . 505--510
M. Tsuchiya and
M. P. Mariani and
J. D. Brom Distributed database management model
and validation . . . . . . . . . . . . . 511--520
A. Ha\'c A decomposition solution to a queueing
network model of a distributed file
system with dynamic locking . . . . . . 521--530
N. Natarajan A distributed scheme for detecting
communication deadlocks . . . . . . . . 531--537
C. Batini and
E. Nardelli and
R. Tamassia A layout algorithm for data flow
diagrams . . . . . . . . . . . . . . . . 538--546
F. Baiardi and
N. De Francesco and
G. Vaglini Development of a debugger for a
concurrent language . . . . . . . . . . 547--553
L. M. Patnaik and
K. V. Iyer Load-leveling in fault-tolerant
distributed computing systems . . . . . 554--560
G. Balbo and
S. C. Bruell and
S. Ghanta Combining queueing network and
Generalized Stochastic Petri Net models
for the analysis of some software
blocking phenomena . . . . . . . . . . . 561--576
B. K. Hillyer and
D. E. Shaw and
A. Nigam NON-VON's performance on certain
database benchmarks . . . . . . . . . . 577--583
M. Trachtenberg Validating Halstead's theory with System
3 data . . . . . . . . . . . . . . . . . 584--584
M. Lipow Comments on ``Estimating the number of
faults in code'' and two corrections to
published data . . . . . . . . . . . . . 584--585
Anonymous Call for papers . . . . . . . . . . . . 586--587
Anonymous Editorial . . . . . . . . . . . . . . . 589--589
D. M. Yellin and
E. M. M. Mueckstein The automatic inversion of attribute
grammars . . . . . . . . . . . . . . . . 590--599
T. V. Lakshman and
A. K. Agrawala Efficient decentralized consensus
protocols . . . . . . . . . . . . . . . 600--607
W. E. Hall and
S. H. Zweben The cloze procedure and software
comprehensibility measurement . . . . . 608--623
T. Ichikawa and
M. Hirakawa ARES: A relational database with the
capability of performing flexible
interpretation of queries . . . . . . . 624--634
K. Ramamritham and
D. Stemple and
D. A. Briggs and
S. Vinter Privilege transfer and revocation in a
port-based system . . . . . . . . . . . 635--648
B. Belkhouche and
J. E. Urban Direct implementation of abstract data
types from abstract specifications . . . 649--661
D. L. Eager and
E. D. Lazowska and
J. Zahorjan Adaptive load sharing in homogeneous
distributed systems . . . . . . . . . . 662--675
Anonymous Call for papers . . . . . . . . . . . . 676--676
Anonymous Call for papers . . . . . . . . . . . . 1--1
Anonymous Editorial . . . . . . . . . . . . . . . 677--677
D. Ferrari Considerations on the insularity of
performance evaluation . . . . . . . . . 678--683
J. N. Gray An approach to decentralized computer
systems . . . . . . . . . . . . . . . . 684--692
E. W. Martin and
R. A. De Millo Operational survivability in gracefully
degrading distributed processing systems 693--704
R. F. Mathis The last 10 percent . . . . . . . . . . 705--712
S. S. Yau and
J. J. P. Tsai A survey of software design techniques 713--721
Anonymous Call for papers . . . . . . . . . . . . 722--723
Anonymous Call for papers . . . . . . . . . . . . 1--1
Anonymous Foreword . . . . . . . . . . . . . . . . 725--725
H. A. Simon Whether software engineering needs to be
artificially intelligent . . . . . . . . 726--732
V. R. Basili and
R. W. Selby and
D. H. Hutchens Experimentation in software engineering 733--743
M. E. Fagan Advances in software inspections . . . . 744--751
A. T. Goldberg Knowledge-based programming: A survey of
program design and construction
techniques . . . . . . . . . . . . . . . 752--768
C. V. Ramamoorthy and
V. Garg and
A. Prakash Programming in the large . . . . . . . . 769--783
H. Weber and
H. Ehrig Specification of modular systems . . . . 784--798
Anonymous Call for papers . . . . . . . . . . . . 799--799
Tak-Sun Yuen and
David Huang-Chang Du Dynamic file structure for partial match
retrieval based on overflow bucket
sharing . . . . . . . . . . . . . . . . 801--810
R. H. Campbell and
B. Randell Error recovery in asynchronous systems 811--826
T. P. Blumer and
D. P. Sidhu Mechanical verification and automatic
implementation of communication
protocols . . . . . . . . . . . . . . . 827--843
C. M. Woodside and
S. K. Tripathi Optimal allocation of file servers in a
local network environment . . . . . . . 844--848
E. Horqwitz and
R. C. Williamson SODOS: A software documentation support
environment --- Its definition . . . . . 849--859
B. Meandzija A formal method for composing a network
command language . . . . . . . . . . . . 860--865
R. P. Trueblood and
A. Sengupta Dynamic analysis of the effects access
rule modifications have upon security 866--870
K. C. Tai and
A. L. Tharp A comparison of computed chaining to
predictors . . . . . . . . . . . . . . . 870--874
D. L. Parnas and
P. C. Clements Correction to ``A rational design
process: How and why to fake it'' . . . 874--874
Anonymous Call for papers . . . . . . . . . . . . 875--876
S. Bologna and
N. G. Leveson Foreword reliability and safety in
real-time systems . . . . . . . . . . . 877--878
B. Auernheimer and
R. A. Kemmerer RT-ASLAN: A specification language for
real-time systems . . . . . . . . . . . 879--889
F. Jahanian and
A. K. L. Mok Safety analysis of timing properties in
real-time systems . . . . . . . . . . . 890--904
P. G. Neumann On hierarchical design of computer
systems for critical applications . . . 905--920
A. M. Tyrrell and
D. J. Holding Design of reliable software in
distributed systems using the
conversation scheme . . . . . . . . . . 921--928
P. G. Bishop and
D. G. Esp and
M. Barnes and
P. Humphreys and
G. Dahll and
J. Lahti PODS --- A project on diverse software 929--940
E. Kligerman and
A. D. Stoyenko Real-Time Euclid: A language for
reliable real-time systems . . . . . . . 941--949
A. A. Abdel-Ghaly and
P. Y. Chan and
B. Littlewood Evaluation of competing software
reliability predictions . . . . . . . . 950--967
R. Troy and
Y. Romain A statistical methodology for the study
of the software failure process and its
application to the ARGOS center . . . . 968--978
T. Downs Extensions to an approach to the
modeling of software testing with some
performance comparisons . . . . . . . . 979--987
R. E. Bloomfield and
P. K. D. Froome The application of formal methods to the
assessment of high integrity software 988--993
Anonymous Call for papers . . . . . . . . . . . . 994--995
B. Dhillon IASTED conference on reliability and
quality control . . . . . . . . . . . . 996--996
W. E. Howden A functional approach to program testing
and analysis . . . . . . . . . . . . . . 997--1005
D. W. Cornell and
D. M. Dias and
P. S. Yu On multisystem coupling through function
request shipping . . . . . . . . . . . . 1006--1017
D. Towsley Allocating programs containing branches
and loops within a multiple processor
system . . . . . . . . . . . . . . . . . 1018--1024
A. E. Conway and
N. D. Georganas Decomposition and aggregation by class
in closed queueing networks . . . . . . 1025--1040
C. M. Woodside Controllability of computer performance
tradeoffs obtained using
controlled-share queue schedulers . . . 1041--1048
H. Kameda The gains from computer communication 1049--1055
D. W. Stemple and
S. T. Vinter and
K. Ramamritham Functional addressing in Gutenberg:
Interprocess communication without
process identifiers . . . . . . . . . . 1056--1066
A. B. Sheltzer and
G. J. Popek Internet Locus: Extending transparency
to an Internet environment . . . . . . . 1067--1075
E. Horowitz and
R. C. Williamson SODOS: A software documentation support
environment --- Its use . . . . . . . . 1076--1087
T. Y. Cheung On the projection method for protocol
verification . . . . . . . . . . . . . . 1088--1089
A. L. Liestman and
R. H. Campbell A fault-tolerant scheduling problem . . 1089--1095
S. Kundu The call-return tree and its application
to program performance analysis . . . . 1096--1098
H. Arisawa and
T. Miura On the properties of extended inclusion
dependences . . . . . . . . . . . . . . 1098--1101
Anonymous Call for papers . . . . . . . . . . . . 1102--1103
B. Dhillon IASTED conference on reliability and
quality control . . . . . . . . . . . . 1104--1104
Anonymous Advance program . . . . . . . . . . . . 1--1
Anonymous Data engineering registration form . . . 1--1
Anonymous Author index . . . . . . . . . . . . . . 1--7
Anonymous Editorial . . . . . . . . . . . . . . . 1105--1105
S. P. Ghosh Statistical relational tables for
statistical database management . . . . 1106--1116
A. N. Habermann and
D. Notkin Gandalf: Software development
environments . . . . . . . . . . . . . . 1117--1127
E. J. Weyuker Axiomatizing software test data adequacy 1128--1138
D. W. Leinbaugh and
M. R. Yamini Guaranteed response times in a
distributed hard-real-time environment 1139--1144
F. Stetter Comments on ``Number of faults per line
of code'' . . . . . . . . . . . . . . . 1145--1145
Anonymous Call for papers . . . . . . . . . . . . 1153--1154
F. Cristian and
D. Skeen Foreword Special Issue on Distributed
Systems . . . . . . . . . . . . . . . . 1--2
Anonymous List of referees . . . . . . . . . . . . 2--2
I. Cidon and
J. M. Jaffe and
M. Sidi Local Distributed Deadlock Detection by
Cycle Detection and Clustering . . . . . 3--14
W. K. Fuchs and
Kun-Lung Wu and
J. A. Abraham Companson and Diagnosis of Large
Replicated Files . . . . . . . . . . . . 15--22
R. Koo and
S. Toueg Checkpointing and Rollback-Recovery for
Distributed Systems . . . . . . . . . . 23--31
F. C. H. Lin and
R. M. Keller The Gradient Model Load Balancing Method 32--38
S. K. Sarin and
N. A. Lynch Discarding Obsolete Information in a
Replicated Database System . . . . . . . 39--47
D. B. Terry Caching Hints in Distributed Systems . . 48--54
W. E. Weihl Distributed Version Management for
Read-Only Actions . . . . . . . . . . . 55--64
A. Black and
N. Hutchinson and
E. Jul and
H. Levy and
L. Carter Distribution and Abstract Types in
Emerald . . . . . . . . . . . . . . . . 65--76
P. B. Gibbons A Stub Generator for Multilanguage RPC
in Heterogeneous Environments . . . . . 77--87
M. L. Scott Language Support for Loosely Coupled
Distributed Programs . . . . . . . . . . 88--103
G. R. Andrews and
R. D. Schlichting and
R. Hayes and
T. D. M. Purdin The Design of the Saguaro Distributed
Operating System . . . . . . . . . . . . 104--118
Anonymous Information for authors . . . . . . . . 119--119
Anonymous IEEE copyright form . . . . . . . . . . 119--119
Anonymous The Third International Conference on
Data Engineering . . . . . . . . . . . . 119--119
Anonymous IEEE Computer Society Publications . . . 119--f-119--f
Anonymous The One Leveraged Investment With a
Guaranteed Return . . . . . . . . . . . 119--d-119--e
Anonymous IEEE Computer Society . . . . . . . . . c2--c2
Anonymous \booktitleIEEE Transactions on Software
Engineering --- Table of contents . . . c1--c1
Anonymous Guest Editors' Note . . . . . . . . . . 125--128
D. E. Denning and
S. G. Akl and
M. Heckman and
T. F. Lunt and
M. Morgenstern and
P. G. Neumann and
R. R. Schell Views for Multilevel Database Security 129--140
J. T. Haigh and
W. D. Young Extending the Noninterference Version of
MLS for SAT . . . . . . . . . . . . . . 141--150
J. D. Halpern and
S. Owre and
N. Proctor and
W. F. Wilson Muse --- a Computer Assisted
Verification System . . . . . . . . . . 151--156
J. T. Haigh and
R. A. Kemmerer and
J. Mchugh and
W. D. Young An Experience Using Two Covert Channel
Analysis Techniques on a Real System
Design . . . . . . . . . . . . . . . . . 157--168
V. D. Gligor and
C. S. Chandersekaran and
Wen-Der Jiang and
A. Johri and
G. L. Luckenbaugh and
L. E. Reich A New Security Testing Method and Its
Application to the Secure Xenix Kernel 169--183
D. M. Berry Towards a Formal Basis for the Formal
Development Method and the Ina Jo
Specification Language . . . . . . . . . 184--201
R. Y. Kain and
C. E. Landwehr On Access Checking in Capability-Based
Systems . . . . . . . . . . . . . . . . 202--207
V. D. Gligor and
C. S. Chandersekaran and
R. S. Chapman and
L. J. Dotterer and
M. S. Hetch and
Wen-Der Jiang and
A. Johri and
G. L. Luckenbaugh and
N. Vasudevan Design and Implementation of Secure
Xenix . . . . . . . . . . . . . . . . . 208--221
D. E. Denning An Intrusion-Detection Model . . . . . . 222--232
D. M. Nessett Factors Affecting Distributed System
Security . . . . . . . . . . . . . . . . 233--248
D. Estrin Controls for Interorganization Networks 249--261
J. H. Moore and
G. J. Simmons Cycle Structure of the DES for Keys
Having Palindromic (or Antipalindromic)
Sequences of Round Keys . . . . . . . . 262--273
J. K. Millen and
S. C. Clark and
S. B. Freedman The Interrogator: Protocol Secuity
Analysis . . . . . . . . . . . . . . . . 274--288
C. Meadows and
D. Mutchler Matching Secrets in the Absence of a
Continuously Available Trusted Authority 289--292
C. G. Girling Covert Channels in LAN's . . . . . . . . 292--296
Anonymous 9th Annual International Conference on
Software Engineering . . . . . . . . . . 296--296
Anonymous Call for Papers . . . . . . . . . . . . 296--296
Anonymous IEEE Computer Society Publications . . . 296--e-296--e
Anonymous IEEE Computer Society . . . . . . . . . c2--c2
Anonymous \booktitleIEEE Transactions on Software
Engineering --- Table of contents . . . c1--c1
N. F. Schneidewind Introduction to the Special Section on
Software Maintenance . . . . . . . . . . 301--301
Anonymous List of referees . . . . . . . . . . . . 302--302
N. F. Schneidewind The State of Software Maintenance . . . 303--310
S. Bendifallah Understanding Software Maintenance Work 311--323
K. Narayanaswamy and
W. Scacchi Maintaining Configurations of Evolving
Software Systems . . . . . . . . . . . . 324--334
D. Kafura and
G. R. Reddy The Use of Software Complexity Metrics
in Software Maintenance . . . . . . . . 335--343
H. D. Rombach A Controlled Experiment on the Impact of
Software Structure on Maintainability 344--354
S. S. Yau and
J. J. Tsai Knowledge Representation of Software
Component Interconnection Information
for Large-Scale Software Modifications 355--361
R. B. Bunt Foreword . . . . . . . . . . . . . . . . 362--362
V. F. Nicola and
V. G. Kulkarni and
K. S. Trivedi Queueing Analysis of Fault-Tolerant
Computer Systems . . . . . . . . . . . . 363--375
K. C. Sevick and
M. J. Johnson Cycle Time Properties of the FDDI Token
Ring Protocol . . . . . . . . . . . . . 376--385
N. G. Leveson and
J. L. Stolzy Safety Analysis Using Petri Nets . . . . 386--397
Y. K. Dalal A Distributed Algorithm for Constructing
Minimal Spanning Trees . . . . . . . . . 398--405
Anonymous Call for papers . . . . . . . . . . . . 406--407
Anonymous Beyond The Basics: A Software
Publication Series for Successful
Computer Professionals From the IEEE
Computer Society . . . . . . . . . . . . 407--c-407--c
Anonymous IEEE Computer Society Publications . . . 407--b-407--b
Anonymous The Information Edge . . . . . . . . . . 407--a-407--a
Anonymous IEEE Computer Society . . . . . . . . . c2--c2
Anonymous \booktitleIEEE Transactions on Software
Engineering --- Table of contents . . . c1--c1
C. Boksenbaum and
M. Cart and
J. Ferrie and
J. F. Pons Concurrent Certifications by Intervals
of Timestamps in Distributed Database
Systems . . . . . . . . . . . . . . . . 409--419
F. Y. Chin and
K. V. S. Ramarao An Information-Based Model for
Failure-Handling in Distributed Database
Systems . . . . . . . . . . . . . . . . 420--431
B. I. Blum A Paradigm for Developing Information
Systems . . . . . . . . . . . . . . . . 432--439
R. T. Mittermeir and
M. Oppitz Software Bases for the Flexible
Composition of Application Systems . . . 440--460
K. Matsumura and
H. Mizutani and
M. Arai An Application of Structural Modeling to
Software Requirements Analysis and
Design . . . . . . . . . . . . . . . . . 461--471
V. Rajlich Refinement Methodology for Ada . . . . . 472--478
H. W. Robb and
H. R. Weistroffer Performance Criteria for Constrained
Nonlinear Programming Codes . . . . . . 479--489
F. G. Pagan Program Structure Charts for Applicative
Languages . . . . . . . . . . . . . . . 490--493
B. Steinholtz and
K. Walden Automatic Identification of Software
System Differences . . . . . . . . . . . 493--497
Sun Zhongxiu and
Li Xining CSM: A Distributed Programming Language 497--500
G. v. Bochmann and
J. P. Verjus Some Comments on ``Transition-Oriented''
Versus ``Structured'' Specification of
Distributed Algorithms and Protocols . . 501--505
Anonymous Call for papers . . . . . . . . . . . . 506--506
Anonymous In this issue . . . . . . . . . . . . . 506--506
Anonymous Beyond the Basics: A Software
Publication Series for Successful
Computer Professionals From the IEEE
Computer Society . . . . . . . . . . . . 506--d-506--d
Anonymous IEEE Computer Society Publications . . . 506--c-506--c
Anonymous Membership Application . . . . . . . . . 506--b-506--b
Anonymous IEEE Computer Society . . . . . . . . . c2--c2
Anonymous \booktitleIEEE Transactions on Software
Engineering --- Table of contents . . . c1--c1
T. Chusho Test Data Selection and Quality
Estimation Based on the Concept of
Essential Branches for Path Testing . . 509--517
B. Sarikaya and
G. v. Bochmann and
E. Cerny A Test Design Methodology for Protocol
Testing . . . . . . . . . . . . . . . . 518--531
Y. H. Kamath and
M. M. Matthews Implementation of an FP-Shell . . . . . 532--539
S. Katz and
O. Shmueli Cooperative Distributed Algorithms for
Dynamic Cycle Prevention . . . . . . . . 540--552
J. C. Knight and
J. I. A. Urquhart On the Implementation and Use of Ada on
Fault-Tolerant Distributed Systems . . . 553--563
Wei Zhao and
K. Ramamritham and
J. A. Stankovic Scheduling Tasks with Resource
Requirements in Hard Real-Time Systems 564--577
J. Magott New NP-Complete Problems in Performance
Evaluation of Concurrent Systems Using
Petri Nets . . . . . . . . . . . . . . . 578--581
R. K. Scott and
J. W. Gault and
D. F. McAllister Fault-Tolerant Software Reliability
Modeling . . . . . . . . . . . . . . . . 582--592
R. N. Mathur Methodology for Business System
Development . . . . . . . . . . . . . . 593--601
S. Masuyama and
T. Ibaraki and
S. Nishio and
T. Hasegawa Shortest Semijoin Schedule for a Local
Area Distributed Database System . . . . 602--606
Anonymous In this issue . . . . . . . . . . . . . 607--607
Anonymous Beyond the Basics: A Software
Publication Series for Successful
Computer Professionals From the IEEE
Computer Society . . . . . . . . . . . . 607--c-607--c
Anonymous IEEE Computer Society Publications . . . 607--b-607--b
Anonymous The Information Edge . . . . . . . . . . 607--a-607--a
Anonymous IEEE Computer Society . . . . . . . . . c2--c2
Anonymous \booktitleIEEE Transactions on Software
Engineering --- Table of contents . . . c1--c1
S. P. Reiss Automatic Compiler Production: The Front
End . . . . . . . . . . . . . . . . . . 609--627
K. Felgentreu and
W. M. Lippe and
F. H. Simon Optimizing Static Scope Lisp by
Repetitive Interpretation of Recursive
Function Calls . . . . . . . . . . . . . 628--635
F. W. Burton and
D. Maurer and
H. G. Oberhauser and
R. Wilhelm A Space-Efficient Optimization of
Call-by-Need . . . . . . . . . . . . . . 636--642
S. K. Das and
V. K. Agrawal and
D. Sarkar and
L. M. Patnaik and
P. S. Goel Reflexive Incidence Matrx (RIM)
Representation of Petri Nets . . . . . . 643--653
R. L. Bagrodia and
K. M. Chandy and
J. Misra A Message-Based Approach to
Discrete-Event Simulation . . . . . . . 654--665
R. D. Schultz and
A. F. Cardenas An Approach and Mechanism for Auditable
and Testable Advanced Transaction
Processing Systems . . . . . . . . . . . 666--676
R. P. Roe and
J. H. Rowland Some Theory Concerning Certification of
Mathematical Subroutines by Black Box
Testing . . . . . . . . . . . . . . . . 677--682
G. J. Holzmann Automated Protocol Validation in Argos:
Assertion Proving and Scatter Searching 683--696
H. F. Li and
W. K. Cheung An Empirical Study of Software Metrics 697--708
S. B. Yao and
A. R. Hevner and
H. Young-Myers Analysis of Database System
Architectures Using Benchmarks . . . . . 709--725
Chuan-Qi Zhu and
Pen-Chung Yew A Scheme to Enforce Data Dependence on
Large Multiprocessor Systems . . . . . . 726--739
S. Purushothaman and
P. A. Subrahmanyam Reasoning About Probabilistic Behavior
in Concurrent Systems . . . . . . . . . 740--745
M. J. Carey Improving the Performance of an
Optimistic Concurrency Control Algorithm
Through Timestamps and Versions . . . . 746--751
M. Chellappa Nontraversible Paths in a Program . . . 751--756
J. Y. Le Boudec Interinput and Interoutput Time
Distribution in Classical Product-Form
Networks . . . . . . . . . . . . . . . . 756--759
K. V. S. Ramarao Comments on ``Detection of Mutual
Inconsistency in Distributed Systems'' 759--760
Anonymous Information for authors . . . . . . . . 760--760
Anonymous IEEE Computer Society Publications . . . 760--a-760--a
Anonymous IEEE Computer Society . . . . . . . . . c2--c2
Anonymous \booktitleIEEE Transactions on Software
Engineering --- Table of contents . . . c1--c1
R. E. Prather and
J. P. Myers The Path Prefix Software Testing
Strategy . . . . . . . . . . . . . . . . 761--766
N. M. Bengtson Measuring Errors in Operational Analysis
Assumptions . . . . . . . . . . . . . . 767--776
J. C. Cherniavsky and
C. H. Smith A Recursion Theoretic Approach to
Program Testing . . . . . . . . . . . . 777--784
A. Motro Superviews: Virtual Integration of
Multiple Databases . . . . . . . . . . . 785--798
W. De Jonge and
A. S. Tanenbaum and
R. P. Van De Riet Two Access Methods Using Compact Binary
Trees . . . . . . . . . . . . . . . . . 799--810
S. Jajodia and
F. N. Springsteel Construction of Universal Instances for
Loop-Free Network Databases Using a
Join-Like Operation . . . . . . . . . . 811--819
J. D. Gannon and
R. G. Hamlet and
H. D. Mills Theory of Modules . . . . . . . . . . . 820--829
P. Freeman A Conceptual Analysis of the Draco
Approach to Constructing Software
Systems . . . . . . . . . . . . . . . . 830--844
D. N. Card and
F. E. Mc Garry and
G. T. Page Evaluating Software Engineering
Technologies . . . . . . . . . . . . . . 845--851
D. R. Jeffery Time-Sensitive Cost Models in the
Commercial MIS Environment . . . . . . . 852--859
S. M. Deen and
R. R. Amin and
M. C. Taylor Data Integration in Distributed
Databases . . . . . . . . . . . . . . . 860--864
C. M. Davidson A Note on Concurrent Programming Control 865--866
Anonymous In this issue . . . . . . . . . . . . . 867--867
Anonymous The One Leveraged Investment With a
Guaranteed Return . . . . . . . . . . . 867--867--a
Anonymous IEEE Computer Society Publications . . . 867--b-867--b
Anonymous IEEE Computer Society . . . . . . . . . c2--c2
Anonymous \booktitleIEEE Transactions on Software
Engineering --- Table of contents . . . c1--c1
S. Jajodia and
S. K. Tripathy Foreword . . . . . . . . . . . . . . . . 869--870
Anonymous List of referees . . . . . . . . . . . . 871--871
S. K. Tripathi and
Yennun Huang and
S. Jajodia Local Area Networks: Software and
Related Issues . . . . . . . . . . . . . 872--879
B. N. Bershad and
D. T. Ching and
E. D. Lazowska and
J. Sanislo and
M. Schwartz A Remote Procedure Call Facility for
Interconnecting Heterogeneous Computer
Systems . . . . . . . . . . . . . . . . 880--894
R. C. Summers A Resource Sharing System for Personal
Computers in a LAN: Concepts, Design,
and Experience . . . . . . . . . . . . . 895--904
R. Agrawal and
A. K. Ezzat Location Independent Remote Execution in
NEST . . . . . . . . . . . . . . . . . . 905--912
J. Nehmer and
D. Haban and
F. Mattern and
D. Wybranietz and
H. D. Rombach Key Concepts of the INCAS Multicomputer
Project . . . . . . . . . . . . . . . . 913--923
P. Jain and
S. S. Lam Modeling and Verification of Real-Time
Protocols for Broadcast Networks . . . . 924--937
Wei Zhao and
K. Ramamritham Virtual Time CSMA Protocols for Hard
Real-Time Communication . . . . . . . . 938--952
D. J. De Witt and
R. Finkel and
M. Solomon The Crystal Multicomputer: Design and
Implementation Experience . . . . . . . 953--966
S. Ramesh and
S. L. Mehndiratta A Methodology for Developing Distributed
Programs . . . . . . . . . . . . . . . . 967--976
Je-Hao Wang and
Tak-Sun Yuen and
D. H. C. Du On Multiple Random Accesses and Physical
Data Placement in Dynamic Files . . . . 977--987
Anonymous In this issue . . . . . . . . . . . . . 987--987
Anonymous Beyond The Basics: A Software
Publication Series for Successful
Computer Professionals From the IEEE
Computer Society . . . . . . . . . . . . 987--a-987--a
Anonymous IEEE Computer Society Publications . . . 987--b-987--b
Anonymous IEEE Computer Society . . . . . . . . . c2--c2
Anonymous \booktitleIEEE Transactions on Software
Engineering --- Table of contents . . . c1--c1
G. v. Bochmann and
G. W. Gerber and
J. M. Serre Semiautomatic Implementation of
Communication Protocols . . . . . . . . 989--1000
G. T. Almes and
C. L. Holman Edmas: An Object-Oriented, Locally
Distributed Mail System . . . . . . . . 1001--1009
V. Gurbaxani and
H. Mendelson Software and Hardware in Data Processing
Budgets . . . . . . . . . . . . . . . . 1010--1017
Y. Y. Sung Performance Analysis of Disk Modulo
Allocation Method for Cartesian Product
Files . . . . . . . . . . . . . . . . . 1018--1026
R. W. Selby and
V. R. Basili and
F. T. Baker Cleanroom Software Development: An
Empirical Evaluation . . . . . . . . . . 1027--1037
Y. Shi and
N. Prywes and
B. Szymanski and
A. Pnueli Very High Level Concurrent Programming 1038--1046
S. Jajodia An Extension of ``Representative
Instances and $ \gamma $-Acyclic
Relational Schemes'' . . . . . . . . . . 1047--1048
Anonymous The Computer Society . . . . . . . . . . 1048--b-1048--b
Anonymous IEEE Computer Society Publications . . . 1048--a-1048--a
Anonymous IEEE Computer Society . . . . . . . . . c2--c2
Anonymous \booktitleIEEE Transactions on Software
Engineering --- Table of contents . . . c1--c1
T. T. Lee An Information-Theoretic Analysis of
Relational Databases --- Part I: Data
Dependencies and Information Metric . . 1049--1061
T. T. Lee An Information-Theoretic Analysis of
Relational Databases --- Part II:
Information Structures of Database
Schemas . . . . . . . . . . . . . . . . 1062--1072
A. A. Farrag and
M. T. Ozsu Towards a General Concurrency Control
Algorithm for Database Systems . . . . . 1073--1079
E. T. Morgan and
R. R. Razouk Interactive State-Space Analysis of
Concurrent Systems . . . . . . . . . . . 1080--1091
H. K. Jain A Comprehensive Model for the Design of
Distributed Computer Systems . . . . . . 1092--1104
R. A. Sahner and
K. S. Trivedi Performance and Reliability Analysis
Using Directed Acyclic Graphs . . . . . 1105--1114
K. Rea and
R. De B. Johnston Automated Analysis of Discrete
Communication Behavior . . . . . . . . . 1115--1126
K. M. Kavi and
B. P. Buckles and
U. N. Bhat Isomorphisms Between Petri Nets and
Dataflow Graphs . . . . . . . . . . . . 1127--1134
S. Mourad and
D. Andrews On the Reliability of the IBM MVS/XA
Operating System . . . . . . . . . . . . 1135--1139
Anonymous Beyond The Basics: A Software
Publication Series for Successful
Computer Professionals From the IEEE
Computer Society . . . . . . . . . . . . 1139--a-1139--a
Anonymous The Computer Society . . . . . . . . . . 1139--c-1139--c
Anonymous IEEE Computer Society Publications . . . 1139--b-1139--b
Anonymous IEEE Computer Society . . . . . . . . . c2--c2
Anonymous \booktitleIEEE Transactions on Software
Engineering --- Table of contents . . . c1--c1
R. E. Fairley Guest Editor's Introduction . . . . . . 1141--1142
P. Freeman Essential Elements of Software
Engineering Education Revisited . . . . 1143--1148
M. A. Ardis The Evolution of Wang Institute's Master
of Software Engineering Program . . . . 1149--1155
D. M. Weiss Teaching a Software Design Methodology 1156--1163
J. L. Bentley and
J. A. Dallen Exercises in Software Design . . . . . . 1164--1169
J. E. Burns and
E. L. Robertson Two Complementary Course Sequences on
the Design and Implementation of
Software Products . . . . . . . . . . . 1170--1175
D. B. Wortman Software Projects in an Academic
Environment . . . . . . . . . . . . . . 1176--1181
W. M. Mc Keeman Experience with a Software Engineering
Project Course . . . . . . . . . . . . . 1182--1192
L. M. Leventhal and
B. T. Mynatt Components of Typical Undergraduate
Software Engineering Courses: Results
from a Survey . . . . . . . . . . . . . 1193--1198
W. E. Riddle and
L. G. Williams Technology Selection: An Educational
Approach . . . . . . . . . . . . . . . . 1199--1206
J. Z. Lavi and
M. I. B. Porat and
A. Ben-David IAI Corporate Software Engineering
Training and Education Program . . . . . 1207--1216
Anonymous The Computer Society . . . . . . . . . . 1216--b-1216--b
Anonymous IEEE Computer Society Publications . . . 1216--a-1216--a
Anonymous IEEE Computer Society . . . . . . . . . c2--c2
Anonymous \booktitleIEEE Transactions on Software
Engineering --- Table of contents . . . c1--c1
Anonymous Editorial . . . . . . . . . . . . . . . 1217--1217
S. Aggarwal and
D. Barbara and
K. Z. Meth Spanner: A Tool for the Specification,
Analysis, and Evaluation of Protocols 1218--1237
Pei-Jyun Leu and
B. Bhargava Multidimensional Timestamp Protocols for
Concurrency Control . . . . . . . . . . 1238--1253
R. Hayes and
R. D. Schlichting Facilitating Mixed Language Programming
in Distributed Systems . . . . . . . . . 1254--1264
V. Milutinovic A Simulation Study of the
Vertical-Migration Microprocessor
Architecture . . . . . . . . . . . . . . 1265--1277
V. R. Basili and
R. W. Selby Comparing the Effectiveness of Software
Testing Strategies . . . . . . . . . . . 1278--1296
M. A. Holliday and
M. K. Vernon A Generalized Timed Petri Net Model for
Performance Analysis . . . . . . . . . . 1297--1310
K. H. Pun and
G. G. Belford Performance Study of Two Phase Locking
in Single-Site Database Systems . . . . 1311--1328
Y. H. Chin and
Weng-Ling Peng An Evaluation of Two New Inference
Control Methods . . . . . . . . . . . . 1329--1339
S. Biswas and
V. Rajaraman An Algorithm to Decide Feasibility of
Linear Integer Constraints Occurring in
Decision Tables . . . . . . . . . . . . 1340--1347
R. Agrawal and
M. J. Carey and
L. W. Mcvoy The Performance of Alternative
Strategies for Dealing with Deadlocks in
Database Management Systems . . . . . . 1348--1363
N. Y. Foo Algebraic Specifications as Solutions of
Implementation Equations . . . . . . . . 1364--1369
H. K. N. Leung and
H. K. Reghbati Comments on Program Slicing . . . . . . 1370--1371
Anonymous In this issue . . . . . . . . . . . . . 1371--1371
Anonymous 1987 Index \booktitleIEEE Transactions
on Software Engineering Vol. SE-13 . . . 1371--1371
Anonymous The Computer Society . . . . . . . . . . 1371--k-1371--k
Anonymous IEEE Computer Society Publications . . . 1371--j-1371--j
Anonymous IEEE Computer Society . . . . . . . . . c2--c2
Anonymous \booktitleIEEE Transactions on Software
Engineering --- Table of contents . . . c1--c1
C. R. Symons Function point analysis: difficulties
and improvements . . . . . . . . . . . . 2--11
R. G. Dromey Systematic program development . . . . . 12--29
F. Panzieri and
S. K. Shrivastava Rajdoot: a remote procedure call
mechanism supporting orphan detection
and killing . . . . . . . . . . . . . . 30--37
L. F. Cabrera and
E. Hunter and
M. J. Karels and
D. A. Hosher User-process communication performance
in networks of computers . . . . . . . . 38--53
V. M. Milutinovic and
J. J. Crnkovic and
C. E. Houstis A simulation study of two distributed
task allocation procedures . . . . . . . 54--61
I. F. Akyildiz On the exact and approximate throughput
analysis of closed queuing networks with
blocking . . . . . . . . . . . . . . . . 62--70
M. A. Ketabchi and
V. Berzins Mathemtical model of composite objects
and its application for organizing
engineering databases . . . . . . . . . 71--84
N. H. Madhavji Fragtypes: a basis for programming
environments . . . . . . . . . . . . . . 85--97
D. P. Sidhu and
C. S. Crall Executable logic specifications for
protocol service interfaces . . . . . . 98--112
P. J. Leu and
B. Bhargava Clarification of two phase locking in
concurrent transaction processing . . . 122--125
J. Bradley A group-select operation for relational
algebra and implications for database
machine design . . . . . . . . . . . . . 126--129
M. H. Eich Graph directed locking . . . . . . . . . 133--140
T. L. Casavant and
J. G. Kuhl A taxonomy of scheduling in
general-purpose distributed computing
systems . . . . . . . . . . . . . . . . 141--154
J. Kent and
H. Garcia-Molina Optimizing shadow recovery algorithms 155--168
M. Adler An algebra for data flow diagram process
decomposition . . . . . . . . . . . . . 169--183
T. T. Lee and
M. Y. Lai A relational algebraic approach to
protocol verification . . . . . . . . . 184--193
J. Karimi and
B. R. Konsynski An automated software design assistant 194--210
V. Dhar and
M. Jarke Dependence directed reasoning and
learning in systems maintenance support 211--227
A. I. Concepcion and
B. P. Zeigler DEVS formalism: a framework for
hierarchical model development . . . . . 228--241
J. Choobineh and
M. V. Mannino and
J. F. Nunamaker and
B. R. Konsynski An expert database design system based
on analysis of forms . . . . . . . . . . 242--253
C. T. Baker Effects of field service on software
reliability . . . . . . . . . . . . . . 254--258
R. C. B. Cooper and
K. G. Hamilton Preserving abstraction in concurrent
programming . . . . . . . . . . . . . . 258--263
D. Gray The formal specification of a small
bookshop information system . . . . . . 263--272
V. Ambriola and
D. Notkin Reasoning about interactive system . . . 272--276
S. Aggarwal and
D. Barbara and
K. Z. Meth A software environment for the
specification and analysis of problems
of coordination and concurrency . . . . 280--290
D. P. Anderson Automated protocol implementation with
RTAG . . . . . . . . . . . . . . . . . . 291--300
J. Billington and
G. R. Wheeler and
M. C. Wilbur-Ham PROTEAN: a high-level Petri net tool for
the specification and verification of
communication protocols . . . . . . . . 301--316
E. J. Cameron and
D. M. Cohen and
B. Gopinath and
W. M. Keese and
L. Ness and
P. Uppaluru and
J. R. Vollaro The IC* model of parallel computation
and programming environment . . . . . . 317--326
C. H. Chow and
S. S. Lam PROSPEC: an interactive programming
environment for designing and verifying
communication protocols . . . . . . . . 327--338
C. Jard and
J. F. Monin and
R. Groz Development of Veda, a prototyping tool
for distributed algorithms . . . . . . . 339--352
S. S. Lam Protocol conversion . . . . . . . . . . 353--362
R. S. Matthews and
K. H. Muralidhar and
S. Sparks MAP 2.1 conformance testing tools . . . 363--374
S. Sevinc and
B. P. Zeigler Entity structure based design
methodology: a LAN protocol example . . 375--383
S. T. Vuong and
A. C. Lau and
R. I. Chan Semiautomatic implementation of
protocols using an Estelle-C compiler 384--393
Y. X. Zhang and
K. Takahashi and
N. Shiratori and
S. Noguchi An interactive protocol synthesis
algorithm using a global state
transition graph . . . . . . . . . . . . 394--404
S. S. Yau and
W. Hong Verification of concurrent control flow
in distributed computer systems . . . . 405--417
I. F. Akyildiz Mean value analysis for blocking
queueing networks . . . . . . . . . . . 418--428
K. R. Dittrich and
R. A. Lorie Version support for engineering database
systems . . . . . . . . . . . . . . . . 429--437
H. Alexander Comments on ``Formal specification of
user interfaces: a comparison and
evaluation of four axiomatic
approaches'' by U. H. Chi . . . . . . . 438--439
W. Cellary and
Z. Krolikowski and
T. Morzy Other comments on ``Optimization
algorithms for distributed queries'' by
P. M. G. Apers . . . . . . . . . . . . . 439--441
B. G. Ryder and
J. S. Pendergrast Experiments in optimizing FP . . . . . . 444--454
K. Schwan and
R. Ramnath and
S. Vasudevan and
D. Ogle A language and system for the
construction and tuning of parallel
programs . . . . . . . . . . . . . . . . 455--471
B. Jayaraman Semantics of EqL . . . . . . . . . . . . 472--480
T. Murata and
D. Zhang A predicate-transition net model for
parallel interpretation of logic
programs . . . . . . . . . . . . . . . . 481--497
T. Rus Parsing languages by pattern matching 498--511
A. L. Wolf and
L. A. Clarke and
J. C. Wileden A model of visibility control . . . . . 512--520
Anonymous Foreword . . . . . . . . . . . . . . . . 521--521
P. Heidelberger and
M. S. Lakshmi A performance comparison of multimicro
and mainframe database architectures . . 522--531
R. Nelson and
D. Towsley and
A. N. Tantawi Performance analysis of parallel
processing systems . . . . . . . . . . . 532--540
D. A. Reed and
A. D. Malony and
B. D. McCredie Parallel discrete event simulation using
shared memory . . . . . . . . . . . . . 541--553
W. Damm A microprogramming logic . . . . . . . . 559--574
R. A. Mueller and
M. R. Duda and
P. H. Sweany and
J. S. Walicki Horizon: a retargetable compiler for
horizontal microarchitectures . . . . . 575--583
A. Aiken and
A. Nicolau A development environment for horizontal
microcode . . . . . . . . . . . . . . . 584--594
V. H. Allan and
R. A. Mueller Compaction with general synchronous
timing . . . . . . . . . . . . . . . . . 595--599
R. I. Winner Naming and binding in a vertical
migration environment . . . . . . . . . 599--607
J. A. Orenstein and
F. A. Manola PROBE spatial data modeling and query
processing in an image database
application . . . . . . . . . . . . . . 611--629
T. Joseph and
A. F. Cardenas PICQUERY: a high level query language
for pictorial database management . . . 630--638
N. Roussopoulos and
C. Faloutsos and
T. Sellis An efficient pictorial database system
for PSQL . . . . . . . . . . . . . . . . 639--650
Y. Cheng and
S. S. Iyengara and
R. L. Kashyap A new method of image compression using
irreducible covers of maximal rectangles 651--658
A. Unnikrishnan and
P. Shankar and
Y. V. Venkatesh Threaded linear hierarchical quadtrees
for computation of geometric properties
of binary images . . . . . . . . . . . . 659--665
M. Tanaka and
T. Ichikawa A visual user interface for map
information retrieval based on semantic
significance . . . . . . . . . . . . . . 666--670
R. Kasturi and
J. Alemany Information extraction from images of
paper-based maps . . . . . . . . . . . . 671--675
L. Mohan and
R. L. Kashyap An object-oriented knowledge
representation for spatial information 675--681
S. K. Chang and
C. W. Yan and
D. C. Dimitroff and
T. Arndt An intelligent image database system . . 681--688
M. Young and
R. N. Taylor and
D. B. Troup Software environment architectures and
user interface facilities . . . . . . . 697--708
S. E. Hudson and
R. King The Cactis project: database support for
software environments . . . . . . . . . 709--719
A. Van Lamsweerde and
B. Delcourt and
E. Delor and
M. C. Schayes and
R. Champagne Generic lifecycle support in the ALMA
environment . . . . . . . . . . . . . . 720--741
P. A. Oberndorf The Common Ada Programming Support
Environment (APSE) Interface Set (CAIS) 742--748
J. Ramanthan and
S. Sarkar Providing customized assistance for
software lifecycle approaches . . . . . 749--757
V. R. Basili and
H. D. Rombach The TAME project: towards
improvement-oriented software
environments . . . . . . . . . . . . . . 758--773
G. Fisher An overview of a graphical multilanguage
applications environment . . . . . . . . 774--786
A. Giacalone and
S. A. Smolka Integrated environments for formally
well-founded design and simulation of
concurrent systems . . . . . . . . . . . 787--802
R. M. Herndon and
V. A. Berzins The realizable benefits of a language
prototyping language . . . . . . . . . . 803--809
K. H. Kim Programmer-transparent coordination of
recovering concurrent processes:
philosophy and rules for efficient
implementation . . . . . . . . . . . . . 810--821
B. Meandzija Archetype: a unified method for the
design and implementation of protocol
architectures . . . . . . . . . . . . . 822--837
Krishna P. Mikkilineni and
Stanley Y. W. Su An Evaluation of Relational Join
Algorithms in a Pipelined Query
Processing Environment . . . . . . . . . 838--848
T. G. Moher PROVIDE: a process visualization and
debugging environment . . . . . . . . . 849--857
A. Moitra and
S. S. Iyengar and
F. B. Bastani and
I. L. Yen Multilevel data structures: models and
performance . . . . . . . . . . . . . . 858--867
S. C. Ntafos A comparison of some structural testing
strategies . . . . . . . . . . . . . . . 868--874
R. Agrawal Alpha: an extension of relational
algebra to express a class of recursive
queries . . . . . . . . . . . . . . . . 879--885
H. Garcia-Molina and
B. Kogan Achieving high availability in
distributed databases . . . . . . . . . 886--896
M. Stonebraker and
E. N. Hanson and
S. Potamianos The POSTGRES rule manager . . . . . . . 897--907
B. C. Jenq and
W. H. Kohler and
D. Towsley A queueing network model for a
distributed database testbed system . . 908--921
M. Kifer and
E. L. Lozinskii SYGRAF: implementing logic programs in a
database style . . . . . . . . . . . . . 922--935
C. Pu and
J. D. Noe and
A. Proudfoot Regeneration of replicated objects: a
technique and its Eden implementation 936--945
S. A. Demurjian and
D. K. Hsiao Towards a better understanding of data
models through the multilingual database
system . . . . . . . . . . . . . . . . . 946--958
M. Kao and
N. Cercone and
W. S. Luk Providing quality responses with natural
language interfaces: the null value
problem . . . . . . . . . . . . . . . . 959--984
W. Kim and
H. T. Chou and
J. Banerjee Operations and implementation of complex
objects . . . . . . . . . . . . . . . . 985--996
T. Ibaraki and
T. Kameda and
N. Katoh Cautious transaction schedulers for
database concurrency control . . . . . . 997--1009
H. Lam and
S. Y. W. Su and
N. R. Koganti A physical database design evaluation
system for CODASYL databases . . . . . . 1010--1022
J. Stelovsky and
H. Sugaya A system for specification and rapid
prototyping of application command
languages . . . . . . . . . . . . . . . 1023--1032
N. C. Rowe Absolute bounds on set intersection and
union sizes from distribution
information . . . . . . . . . . . . . . 1033--1048
K. Siegrist Reliability of systems with Markov
transfer of control . . . . . . . . . . 1049--1053
Y. Kakuda and
Y. Wakahara and
M. Norigoe An acyclic expansion algorithm for fast
protocol validation . . . . . . . . . . 1059--1070
M. A. Bassiouni Single-site and distributed optimistic
protocols for concurrency control . . . 1071--1080
K. C. Kinsley and
C. E. Hughes Evaluating database update schemes: a
methodology and its applications to
distributive systems . . . . . . . . . . 1081--1089
Y. Wang A distributed specification model and
its prototyping . . . . . . . . . . . . 1090--1097
T. Tenma and
H. Tsubotani and
M. Tanaka and
T. Ichikawa A system for generating
language-oriented editors . . . . . . . 1098--1109
M. Edel The Tinkertoy graphical programming
environment . . . . . . . . . . . . . . 1110--1115
B. Ramamurthy and
A. Melton A synthesis of software science measures
and the cyclomatic number . . . . . . . 1116--1121
S. M. Shatz Towards complexity metrics for Ada
tasking . . . . . . . . . . . . . . . . 1122--1127
S. S. Yau and
R. A. Nicholl and
J. J. P. Tsai and
S. S. Liu An integrated life-cycle model for
software maintenance . . . . . . . . . . 1128--1144
C. V. Ramamoorthy and
V. Garg and
A. Prakash Support for reusability in Genesis . . . 1145--1154
C. F. Yu and
B. W. Wah Learning dominance relations in combined
search problems . . . . . . . . . . . . 1155--1175
S. J. Hartley An analysis of some problems in managing
virtual memory systems with fast
secondary storage devices . . . . . . . 1176--1187
S. E. Hudson and
R. King Semantic feedback in the Higgens UIMS 1188--1206
R. C. Waters Program translation via abstraction and
reimplementation . . . . . . . . . . . . 1207--1228
G. Von Bochmann Delay-independent design for distributed
systems . . . . . . . . . . . . . . . . 1229--1237
Michael L. Scott and
Raphael A. Finkel A simple mechanism for type security
across compilation units . . . . . . . . 1238--1239
D. Hoffman and
R. Snodgrass Trace specifications: methodology and
models . . . . . . . . . . . . . . . . . 1243--1252
B. Korel PELAS-program error-locating assistant
system . . . . . . . . . . . . . . . . . 1253--1260
T. J. Yu and
V. Y. Shen and
H. E. Dunsmore An analysis of several software defect
models . . . . . . . . . . . . . . . . . 1261--1270
T. Tenny Program readability: procedures versus
comments . . . . . . . . . . . . . . . . 1271--1279
L. Orman Functional development of database
applications . . . . . . . . . . . . . . 1280--1292
P. Rullo and
D. Sacca An automatic physical designer for
network model databases . . . . . . . . 1293--1306
P. S. Yu and
S. Balsamo and
Y. H. Lee Dynamic transaction routing in
distributed database systems . . . . . . 1307--1318
S. Pramanik and
D. Vineyard Optimizing join queries in distributed
databases . . . . . . . . . . . . . . . 1319--1326
S. Zhou A trace-driven simulation study of
dynamic load balancing . . . . . . . . . 1327--1341
C. F. Yu and
B. W. Wah Efficient branch-and-bound algorithms on
a two-level memory system . . . . . . . 1342--1356
E. J. Weyuker Evaluating software complexity measures 1357--1365
J. S. Davis and
R. J. LeBlanc A study of the applicability of
complexity measures . . . . . . . . . . 1366--1372
J. T. Nosek and
R. B. Schwartz User validation of information system
requirements: some empirical results . . 1372--1375
S. S. Lam Correction to `Protocol conversion' . . 1376
Christos Faloutsos Gray codes for partial match and range
queries . . . . . . . . . . . . . . . . 1381--1393
C. U. Smith Applying synthesis principles to create
responsive software systems . . . . . . 1394--1408
Luqi and
V. Berzins and
R. Yeh A prototyping language for real-time
software . . . . . . . . . . . . . . . . 1409--1423
J. L. W. Kessels PHILAN: a LAN providing a reliable
message service for distributed
processing . . . . . . . . . . . . . . . 1424--1431
F. B. Bastani and
I. L. Yen and
I. R. Chen A class of inherently fault tolerant
distributed programs . . . . . . . . . . 1432--1442
A. K. Elmagarmid and
N. Soundararajan and
M. T. Liu A distributed deadlock detection and
resolution algorithm and its correctness
proof . . . . . . . . . . . . . . . . . 1443--1452
A. M. Davis and
E. H. Bersoff and
E. R. Comer A strategy for comparing alternative
software development life cycle models 1453--1461
B. W. Boehm and
P. N. Papaccio Understanding and controlling software
costs . . . . . . . . . . . . . . . . . 1462--1477
K. Siegrist Reliability of systems with Markov
transfer of control, II . . . . . . . . 1478--1480
C. M. Davidson Quicksort revisited . . . . . . . . . . 1480--1481
P. G. Frankl and
E. J. Weyuker An applicable family of data flow
testing criteria . . . . . . . . . . . . 1483--1498
M. Young and
R. N. Taylor Combining static concurrency analysis
with symbolic execution . . . . . . . . 1499--1511
S. N. Weiss and
E. J. Weyuker An extended domain-based model of
software reliability . . . . . . . . . . 1512--1524
A. J. Gordon and
R. A. Finkel Handling timing errors in distributed
programs . . . . . . . . . . . . . . . . 1525--1535
I. F. Akyildiz and
A. Sieber Approximate analysis of load dependent
general queueing networks . . . . . . . 1537--1545
N. H. Gehani and
W. D. Roome Rendezvous facilities: Concurrent C and
the Ada language . . . . . . . . . . . . 1546--1553
N. De Francesco and
G. Vaglini Description for a tool specifying and
prototyping concurrent programs . . . . 1554--1564
D. P. Sidhu and
J. Aristizabal Constructing submodule specifications
and network protocols . . . . . . . . . 1565--1577
T. L. Casavant and
J. G. Kuhl Effects of response and stability on
scheduling in distributed computing
systems . . . . . . . . . . . . . . . . 1578--1588
C. U. Munoz An approach to software product testing 1589--1596
S. Ceri and
S. Crespi-Reghizzi and
A. Di Maio and
L. A. Lavazza Software prototyping by relational
techniques: experiences with program
construction systems . . . . . . . . . . 1597--1609
G. Lausen Modeling and analysis of the behavior of
information systems . . . . . . . . . . 1610--1620
A. Maggiolo-Schettini and
M. Napoli and
G. Tortora Web structures: a tool for representing
and manipulating programs . . . . . . . 1621--1639
S. J. Hartley Compile-time program restructuring in
multiprogrammed virtual memory systems 1640--1644
K. S. Lew and
T. S. Dillon and
K. E. Forward Software complexity and its impact on
software reliability . . . . . . . . . . 1645--1655
K. P. Mikkilineni and
Y. C. Chow and
S. Y. W. Su Petri-net-based modeling and evaluation
of pipelined processing of concurrent
database queries . . . . . . . . . . . . 1656--1667
G. Z. Qadah and
K. B. Irani The join algorithms on a shared-memory
multiprocessor database machine . . . . 1668--1683
J. Banerjee and
W. Kim and
S. J. Kim and
J. F. Garza Clustering a DAG for CAD databases . . . 1684--1699
D. Rotem and
A. Segev Algorithms for multidimensional
partitioning of static files . . . . . . 1700--1710
D. S. Batoory and
J. R. Barnett and
J. F. Garza and
K. P. Smith and
K. Tsukuda and
B. C. Twichell and
T. E. Wise GENESIS: an extensible database
management system . . . . . . . . . . . 1711--1730
C. C. Yang and
G. Li and
P. A. B. Ng An improved algorithm based on subset
closures for synthesizing a relational
database scheme . . . . . . . . . . . . 1731--1738
R. W. Selby and
A. A. Porter Learning from examples: generation and
evaluation of decision trees for
software resource analysis . . . . . . . 1743--1757
L. D. Erman and
J. S. Lark and
F. Hayes-Roth ABE: an environment for engineering
intelligent systems . . . . . . . . . . 1758--1770
E. Schoen and
R. G. Smith and
B. G. Buchanan Design of knowledge-based systems with a
knowledge-based assistant . . . . . . . 1771--1791
K. L. Clark PARLOG and its applications . . . . . . 1792--1804
J. Herath and
Y. Yamaguchi and
N. Saito and
T. Yuba Dataflow computing models, languages,
and machines for intelligence
computations . . . . . . . . . . . . . . 1805--1828
D. I. Moldovan and
C. I. Wu A hierarchical knowledge based system
for airplane classification . . . . . . 1829--1834
D. C. Sarkar and
S. C. De Sarkar Some inference rules for integer
arithmetic for verification of flowchart
programs on integers . . . . . . . . . . 1--9
A. N. Choudhary and
W. H. Kohler and
J. A. Stankovic and
D. Towsley A modified priority based probe
algorithm for distributed deadlock
detection and resolution . . . . . . . . 10--17
Edward R. Omiecinski Heuristics for Join Processing Using
Nonclustered Indexes . . . . . . . . . . 18--25
J. S. J. Chen and
V. O. K. Li Optimizing joins in fragmented database
systems on a broadcast local network . . 26--38
S. Jajodia and
D. Mutchler A pessimistic consistency control
algorithm for replicated files which
achieves high availability . . . . . . . 39--46
T. Minoura and
S. S. Iyengar Data and time abstraction techniques for
analyzing multilevel concurrent systems 47--59
Chao-Chih Yang Deduction graphs: an algorithm and
applications . . . . . . . . . . . . . . 60--67
P. Jalote Resilient objects in broadband networks 68--72
C. S. Hartzman The delay due to dynamic two-phase
locking . . . . . . . . . . . . . . . . 72--82
M. Takahashi and
Y. Kamayachi An empirical study of a model for
program error prediction . . . . . . . . 82--86
K. J. Ottenstein A simplified framework for reduction in
strength . . . . . . . . . . . . . . . . 86--92
D. Davcev A dynamic voting scheme in distributed
systems . . . . . . . . . . . . . . . . 93--97
P. Armenise A structured approach to program
optimization . . . . . . . . . . . . . . 101--108
T. K. Abdel-Hamid The dynamics of software project
staffing: a system dynamics based
simulation approach . . . . . . . . . . 109--119
K. K. Ramakrishnan and
J. S. Emer Performance analysis of mass storage
service alternatives for distributed
systems . . . . . . . . . . . . . . . . 120--133
D. M. Nicol Optimal partitioning of random programs
across two processors . . . . . . . . . 134--141
B. C. Desai Performance of a composite attribute and
join index . . . . . . . . . . . . . . . 142--152
S. Ceri and
G. Gottlob and
G. Wiederhold Efficient database access from Prolog 153--164
F. L. Bauer and
B. Moller and
H. Partsch and
P. Pepper Formal program construction by
transformations-computer-aided,
intuition-guided programming . . . . . . 165--180
J. M. Wing and
M. R. Nixon Extending Ina Jo with temporal logic . . 181--197
M. S. Feather Constructing specifications by combining
parallel elaborations . . . . . . . . . 198--208
G. Peterka and
T. Murata Proof procedure and answer extraction in
Petri net model of logic programs . . . 209--217
D. B. Brown and
S. Maghsoodloo and
W. H. Deason A cost model for determining the optimal
number of software test cases . . . . . 218--221
D. B. Skillicorn and
J. I. Glasgow Real-time specification using Lucid . . 221--229
R. J. A. Buhr and
G. M. Karam and
C. J. Hayes and
C. M. Woodside Software CAD: a revolutionary approach 235--249
A. L. Wolf and
L. A. Clarke and
J. C. Wileden The AdaPIC tool set: supporting
interface control and analysis
throughout the software development
process . . . . . . . . . . . . . . . . 250--263
P. Jalote Functional refinement and nested objects
for object-oriented design . . . . . . . 264--270
R. Jha and
J. M. Kamrad and
D. T. Cornhill Ada program partitioning language: a
notion for distributing Ada programs . . 271--280
R. A. Volz and
T. N. Mudge and
G. D. Buzzard and
P. Krishnan Translation and execution of distributed
Ada programs: Is it still Ada? . . . . . 281--292
A. F. Brindle and
R. N. Taylor and
D. F. Martin A debugger for Ada tasking . . . . . . . 293--304
M. B. Feldman and
M. L. Moran Validating a demonstration tool for
graphics-assisted debugging of Ada
concurrent programs . . . . . . . . . . 305--313
T. Murata and
B. Shenker and
S. M. Shatz Detection of Ada static deadlocks using
Petri net invariants . . . . . . . . . . 314--326
L. M. Ni and
C. F. E. Wu Design tradeoffs for process scheduling
in shared memory multiprocessor systems 327--334
R. F. Cmelik and
N. H. Gehani and
W. D. Roome Experience with multiple processor
versions of Concurrent C . . . . . . . . 335--344
Y. Tohma and
K. Tokunaga and
S. Nagase and
Y. Murata Structural approach to the estimation of
the number of residual software faults
based on the hyper-geometric
distribution . . . . . . . . . . . . . . 345--355
A. Fuggetta and
C. Ghezzi and
D. Mandrioli Some consideration on real-time behavior
of concurrent programs . . . . . . . . . 356--359
B. Sanden The case for electric design of
real-time software . . . . . . . . . . . 360--362
P. A. Curritt and
M. Dyer and
H. D. Mills Correction to `Certifying the
reliability of software' (Jan. 1986
3--11) . . . . . . . . . . . . . . . . . 362
G. Florin and
S. Natkin Necessary and sufficient ergodicity
condition for open synchronized queueing
networks . . . . . . . . . . . . . . . . 367--380
P. J. Haas and
G. S. Shedler Stochastic Petri net representation of
discrete event simulations . . . . . . . 381--393
J. Bechta Dugan and
G. Ciardo Stochastic Petri net analysis of a
replicated file system . . . . . . . . . 394--401
N. F. Schneidewind Distributed system software design
paradigm with application to computer
networks . . . . . . . . . . . . . . . . 402--412
D. P. Sidhu and
T. K. Leung Formal methods for protocol testing: a
detailed study . . . . . . . . . . . . . 413--426
M. A. Linton and
R. W. Quong A macroscopic profile of program
compilation and linking . . . . . . . . 427--436
D. M. Dias and
B. R. Iyer and
J. T. Robinson and
P. S. Yu Integrated concurrency-coherency
controls for multisystem data sharing 437--448
J. A. Larson and
S. B. Navathe and
R. Elmasri A theory of attributed equivalence in
databases with application to schema
integration . . . . . . . . . . . . . . 449--463
A. U. Tansel and
M. E. Arkun and
G. Ozsoyoglu Time-by-example query language for
historical databases . . . . . . . . . . 464--478
A. Dogac and
B. Yuruten and
S. Spaccapietra A generalized expert system for database
design . . . . . . . . . . . . . . . . . 479--491
M. Ahamad and
M. H. Ammar Performance characterization of
quorum-consensus algorithms for
replicated data . . . . . . . . . . . . 492--496
S. H. Zweben and
J. S. Gourlay Comments, with reply, on ``Axiomatizing
software test data adequacy'' by E. J.
Weyuker . . . . . . . . . . . . . . . . 496--501
S. K. Chang and
M. J. Tauber and
B. Yu and
J. S. Yu A visual language compiler . . . . . . . 506--525
P. Jalote Testing the completeness of
specifications . . . . . . . . . . . . . 526--531
B. Hailpern and
T. Huynh and
G. Revesz Comparing two functional programming
systems . . . . . . . . . . . . . . . . 532--542
W. H. Shaw and
J. W. Howatt and
R. S. Maness and
D. M. Miller A software science model of compile time 543--549
H. D. Mills and
V. R. Basili and
J. D. Gannon and
R. G. Hamlet Mathematical principles for a first
course in software engineering . . . . . 550--559
R. T. Jacob and
I. P. Page Synthesis of mutual exclusion solutions
based on binary semaphores . . . . . . . 560--568
P. M. Lenders Distributed computing with single
read-single write variables . . . . . . 569--574
W. S. Luk and
F. Ling An analytic/empirical study of
distributed sorting on a local area
network . . . . . . . . . . . . . . . . 575--586
Z. Xu and
K. Hwang Molecule: a language construct for
layered development of parallel programs 587--599
S. P. Ghosh Numerical operations on a relational
database . . . . . . . . . . . . . . . . 600--610
G. Barrett Formal methods applied to a
floating-point number system . . . . . . 611--621
J. L. Baer and
Y. B. Lin Improving quicksort performance with a
codeword data structure . . . . . . . . 622--631
D. A. Varvel and
L. Shapiro The computational completeness of
extended database query languages . . . 632--638
K. B. Lakshmanan and
K. Thulasiraman and
M. A. Comeau An efficient distributed protocol for
finding shortest paths in networks with
negative weights . . . . . . . . . . . . 639--644
I. Cidon An efficient distributed knot detection
algorithm . . . . . . . . . . . . . . . 644--649
R. K. Lind and
K. Vairavan An experimental investigation of
software metrics and their relationship
to software development effort . . . . . 649--653
L. Ciminiera and
A. Valenzano Authentication mechanisms in
microprocessor-based local area networks 654--658
J. Wu and
E. B. Fernandez A simplification of a conversation
design scheme using Petri nets . . . . . 658--660
J. Magee and
J. Kramer and
M. Sloman Constructing distributed systems in
Conic . . . . . . . . . . . . . . . . . 663--675
R. A. Finkel and
M. L. Scott and
Y. Artsy and
H. Y. Chang Experience with Charlotte: simplicity
and function in a distributed operating
system . . . . . . . . . . . . . . . . . 676--685
A. R. Tripathi An overview of the Nexus distributed
operating system design . . . . . . . . 686--695
M. Y. Lai and
W. K. Wilkinson and
V. Lanin On distributing JASMIN's optimistic
multiversioning page manager . . . . . . 696--704
A. Kumar and
M. Stonebraker Performance considerations for an
operating system transaction manager . . 705--714
K. H. Kim An approach to experimental evaluation
of real-time fault-tolerant distributed
computing schemes . . . . . . . . . . . 715--725
B. Bhargava and
J. Riedl The Raid distributed database system . . 726--736
S. J. Zeil Perturbation techniques for detecting
domain errors . . . . . . . . . . . . . 737--746
C. L. Ramsey and
V. R. Basili An evaluation of expert systems for
software engineering management . . . . 747--759
C. C. Yang and
J. J. Y. Chen and
H. L. Chau Algorithms for constructing minimal
deduction graphs . . . . . . . . . . . . 760--770
B. Jayaraman and
G. Gupta EQL: the language and its implementation 771--779
C. T. Yu and
K. C. Guh and
D. Brill and
A. L. P. Chen Partition strategy for distributed query
processing in fast local networks . . . 780--793
Y. Manolopoulos and
J. G. Kollias Expressions for completely and partly
unsuccessful batched search of
sequential and tree-structured files . . 794--799
R. O. Onvural and
H. G. Perros Approximate throughput analysis of
cyclic queueing networks with finite
buffers . . . . . . . . . . . . . . . . 800--808
H. H. Ammar and
S. M. R. Islam Time scale decomposition of a class of
generalized stochastic Petri net models 809--820
C. May The parallel assignment problem
redefined . . . . . . . . . . . . . . . 821--824
M. P. Herlihy and
M. S. McKendry Timestamp-based orphan elimination . . . 825--831
M. Ajmone Marsan and
G. Balbo and
A. Bobbio and
G. Chiola and
G. Conte and
A. Cumani The effect of execution policies on the
semantics and analysis of stochastic
Petri nets . . . . . . . . . . . . . . . 832--846
R. Gusella and
S. Zatti The accuracy of the clock
synchronization achieved by TEMPO in
Berkeley UNIX 4.3BSD . . . . . . . . . . 847--853
J. L. Wolf and
D. M. Dias and
B. R. Iyer and
P. S. Yu Multisystem coupling by a combination of
data sharing and data partitioning . . . 854--860
B. Samadi TUNEX: a knowledge-based system for
performance tuning of the UNIX operating
system . . . . . . . . . . . . . . . . . 861--874
A. C. Shaw Reasoning about time in higher-level
language software . . . . . . . . . . . 875--889
B. Lazzerini and
L. Lopriore Abstraction mechanisms for event control
in program debugging . . . . . . . . . . 890--901
B. W. Boehm and
R. Ross Theory-W software project management
principles and examples . . . . . . . . 902--916
L. M. Wegner and
J. I. Teuhola The external Heapsort . . . . . . . . . 917--925
Liu Lingzhong Comments on ``A distributed scheme for
detecting communication deadlocks'' by
N. Natarajan . . . . . . . . . . . . . . 926
B. Sanden Correction to `The case for electric
design of real-time software' . . . . . 926
Guang-Huei Chiou and
Wen-Tsuen Chen Secure broadcasting using the secure
lock . . . . . . . . . . . . . . . . . . 929--934
S. P. Hufnagel and
J. C. Browne Performance properties of vertically
partitioned object-oriented systems . . 935--946
M. L. Fontenot Software congestion, mobile servers, and
the hyperbolic model . . . . . . . . . . 947--962
S. K. Chen and
W. T. Tsai and
M. B. Thuraisingham Recovery point selection on a reverse
binary tree task model . . . . . . . . . 963--976
R. K. Shyamasundar and
J. W. Thatcher Language constructs for specifying
concurrency in CDL . . . . . . . . . . . 977--993
U. Halici and
A. Dogac Concurrency control in distributed
databases through time intervals and
short-term locks . . . . . . . . . . . . 994--1003
D. W. Cornell and
P. S. Yu On optimal site assignment for relations
in the distributed database environment 1004--1009
J. I. Aoe An efficient implementation of static
string pattern matching machines . . . . 1010--1016
A. Kusiak Expert systems and optimization . . . . 1017--1020
C. Y. Lin and
R. R. Levary Computer-aided software development
process design . . . . . . . . . . . . . 1025--1037
G. Ozsoyoglu and
H. Wang A relational calculus with set
operators, its safety, and equivalent
graphical languages . . . . . . . . . . 1038--1052
R. Bagrodia Process synchronization: design and
performance evaluation of distributed
algorithms . . . . . . . . . . . . . . . 1053--1065
J. I. Aoe An efficient digital search algorithm by
using a double-array structure . . . . . 1066--1077
J. Etkin and
J. A. Zinky Development life cycle of computer
networks: the executable model approach 1078--1089
S. A. Mamrak and
M. S. Kaelbling and
C. K. Nicholas and
M. Share Chameleon: a system for solving the
data-translation problem . . . . . . . . 1090--1108
D. J. Troy and
C. T. Yu and
W. Zhang Linearization of nonlinear recursive
rules . . . . . . . . . . . . . . . . . 1109--1119
A. Malhotra and
H. M. Markowitz and
Y. Tsalalikhin and
D. P. Pazel and
L. M. Burns An entity-relationship programming
language . . . . . . . . . . . . . . . . 1120--1130
J. A. Lehman An empirical comparison of textual and
graphical data structure documentation
for Cobol programs . . . . . . . . . . . 1131--1135
Chi-Sung Laih and
Lein Harn and
Jau-Yien Lee On the design of a single-key-lock
mechanism based on Newton's
interpolating polynomial . . . . . . . . 1135--1137
K. Sugihara and
T. Kikuno and
N. Yoshida A Meeting Scheduler for Office
Automation . . . . . . . . . . . . . . . 1141--1146
A. Thomasian and
In Kyung Ryu A Recursive Solution Method to Analyze
the Performance of Static Locking
Systems . . . . . . . . . . . . . . . . 1147--1156
Sang Hyuk Son and
A. K. Agrawala Distributed Checkpointing for Globally
Consistent States of Databases . . . . . 1157--1167
Xian-he Sun and
N. N. Kamel and
L. M. Ni Processing Implication on Queries . . . 1168--1175
C. H. Kung Conceptual Modeling in the Context of
Development . . . . . . . . . . . . . . 1176--1187
Kang G. Shin and
C. M. Krishna and
Yann-hang Lee Optimal Dynamic Control of Resources in
a Distributed System . . . . . . . . . . 1188--1198
R. D. Banker and
C. F. Kemerer Scale Economies in New Software
Development . . . . . . . . . . . . . . 1199--1205
S. Balsamo and
L. Donatiello On the Cycle Time Distribution in a
Two-Stage Cyclic Network with Blocking 1206--1216
P. Ciaccia and
M. R. Scalas Optimization Strategies for Relational
Queries . . . . . . . . . . . . . . . . 1217--1235
M. Ruschitzka Heterogeneous Data Translations Based on
Environment Grammars . . . . . . . . . . 1236--1251
Wei-Chung Hsu and
C. N. Fischer and
J. R. Goodman On the Minimization of Loads/Stores in
Local Register Allocation . . . . . . . 1252--1260
H. Chetto and
M. Chetto Some Results of the Earliest Deadline
Scheduling Algorithm . . . . . . . . . . 1261--1269
V. R. Iyer and
H. A. Sholl Sofiware Partitioning for Distributed,
Sequential, Pipelined Applications . . . 1270--1279
Lung-chun Liu and
E. Horowitz A Formal Model for Software Project
Management . . . . . . . . . . . . . . . 1280--1293
D. B. Bisant and
J. R. Lyle A Two-Person Inspection Method to
Improve Prog ramming Productivity . . . 1294--1304
I. F. Akyildiz and
H. Von Brand Central Server Models with Multiple Job
Classes, State Dependent Routing, and
Rejection Blocking . . . . . . . . . . . 1305--1312
L. A. Clarke and
A. Podgurski and
D. J. Richardson and
S. J. Zeil A formal evaluation of data flow path
selection criteria . . . . . . . . . . . 1318--1332
K. Shannon and
R. Snodgrass Mapping the Interface Description
Language type model into C . . . . . . . 1333--1346
G. V. Bochmann and
R. Dssouli and
J. R. Zhao Trace analysis for conformance and
arbitration testing . . . . . . . . . . 1347--1356
J. P. Gupta and
S. C. Winter and
D. R. Wilson CTDNet --- a mechanism for the
concurrent execution of lambda graphs 1357--1367
D. Sarkar and
S. C. De Sarkar A set of inference rules for quantified
formula handling and array handling in
verification of programs over integers 1368--1381
W. R. Bevier Kit: a study in operating system
verification . . . . . . . . . . . . . . 1382--1396
H. Ossher A case study in structure specification:
a grid description of Scribe . . . . . . 1397--1416
M. Evangelist and
N. Francez and
S. Katz Multiparty interactions for interprocess
communication and synchronization . . . 1417--1426
D. Fernandez-Baca Allocating modules to processors in a
distributed system . . . . . . . . . . . 1427--1436
T. H. Merrett and
N. Laliberte Including scalars in a programming
language based on the relational algebra 1437--1443
M. M. Theimer and
K. A. Lantz Finding idle machines in a
workstation-based distributed system . . 1444--1458
A. Hac A distributed algorithm for performance
improvement through file replication,
file migration, and process migration 1459--1470
G. M. Karam and
C. M. Stanczyk and
G. W. Bond Critical races in Ada programs . . . . . 1471--1480
S. S. Brilliant and
J. C. Knight and
N. G. Leveson The consistent comparison problem in
$N$-version software . . . . . . . . . . 1481--1485
H. Joe Statistical inference for
general-order-statistics and
nonhomogeneous-Poisson-process software
reliability models . . . . . . . . . . . 1485--1490
A. Chung and
D. P. Sidhu On conditions for defining a closed
cover to verify progress for
communicating finite state machines . . 1491--1494
M. L. Dertouzos and
A. K. Mok Multiprocessor online scheduling of
hard-real-time tasks . . . . . . . . . . 1497--1506
N. R. Howes and
A. C. Weaver Measurements of Ada overhead in
OSI-style communications systems . . . . 1507--1517
R. S. Sandhu Recognizing immediacy in an $N$-tree
hierarchy and its application to
protection groups . . . . . . . . . . . 1518--1525
W. H. Bahaa-El-Din and
F. B. Bastani and
J. E. Teng Performance analysis of periodic and
concurrent data structure maintenance
strategies for network servers . . . . . 1526--1536
L. L. Pollock and
M. L. Soffa An incremental version of iterative data
flow analysis . . . . . . . . . . . . . 1537--1549
D. Sarkar and
S. C. De Sarkar A theorem prover for verifying iterative
programs over integers . . . . . . . . . 1550--1566
G. Bernard and
A. Duda and
Y. Haddad and
G. Harrus Primitives for distributed computing in
a heterogeneous local area network
environment . . . . . . . . . . . . . . 1567--1578
M. V. Devarakonda and
R. K. Iyer Predictability of process resource
usage: a measurement-based study on UNIX 1579--1586
B. E. Wojcik and
Z. M. Wojcik Sufficient condition for a communication
deadlock and distributed deadlock
detection . . . . . . . . . . . . . . . 1587--1595
B. Littlewood and
D. R. Miller Conceptual modeling of coincident
failures in multiversion software . . . 1596--1614
C. Q. Yang and
B. P. Miller Performance measurement for parallel and
distributed programs: a structured and
automatic approach . . . . . . . . . . . 1615--1629
L. Felician and
G. Zalateu Validating Halstead's theory for Pascal
programs . . . . . . . . . . . . . . . . 1630--1632
S. Chowdhury The mean resequencing delay for M/H$_K$
/$ \infty $ systems . . . . . . . . . . 1633--1638
J. A. Hager Software cost reduction methods in
practice . . . . . . . . . . . . . . . . 1638--1644
A. N. Choudhary and
W. H. Kohler and
J. A. Stankovic and
D. Towsley Correction to ``A modified priority
based probe algorithm for distributed
deadlock detection and resolution' (A.
N. Choudhary et al.) . . . . . . . . . . 1644--1644
Y. Hirakawa Comments, with reply, on ``On the
projection method for protocol
verification'' by T.-Y. Cheung . . . . . 370--371
F. Kaudel Comments on ``Allocating programs
containing branches and loops within a
multiple processor system'' by D.
Towsley . . . . . . . . . . . . . . . . 471
G. M. Karam Comments on ``Measurements of Ada
overhead in OSI-style communications
systems'' . . . . . . . . . . . . . . . 1435--1439
C. M. McNamee and
R. A. Olsson Comments on ``Critical races in Ada
programs'' . . . . . . . . . . . . . . . 1439
Lin Lin Wang Thorough investigation into ``An
improved algorithm based on subset
closures for synthesizing a relational
database scheme'' . . . . . . . . . . . 271--274