


default search action
IEEE Transactions on Software Engineering (TSE), Volume 13
Volume 13, Number 1, January 1987
- Israel Cidon, Jeffrey M. Jaffe, Moshe Sidi:

Local Distributed Deadlock Detection by Cycle Detection and Clustering. 3-14 - W. Kent Fuchs, Kun-Lung Wu, Jacob A. Abraham:

Comparison and Diagnosis of Large Replicated Files. 15-22 - Richard Koo, Sam Toueg:

Checkpointing and Rollback-Recovery for Distributed Systems. 23-31 - Frank C. H. Lin, Robert M. Keller:

The Gradient Model Load Balancing Method. 32-38 - Sunil K. Sarin, Nancy A. Lynch:

Discarding Obsolete Information in a Replicated Database System. 39-47 - Douglas B. Terry:

Caching Hints in Distributed Systems. 48-54 - William E. Weihl:

Distributed Version Management for Read-Only Actions. 55-64 - Andrew P. Black

, Norman C. Hutchinson, Eric Jul, Henry M. Levy, Larry Carter:
Distribution and Abstract Types in Emerald. 65-76 - Phillip B. Gibbons:

A Stub Generator for Multilanguage RPC in Heterogeneous Environments. 77-87 - Michael L. Scott

:
Language Support for Loosely Coupled Distributed Programs. 88-103 - Gregory R. Andrews, Richard D. Schlichting, Roger Hayes, Titus D. M. Purdin:

The Design of the Saguaro Distributed Operating System. 104-118
Volume 13, Number 2, February 1987
- Dorothy E. Denning, Selim G. Akl, Mark R. Heckman, Teresa F. Lunt, Matthew Morgenstern, Peter G. Neumann, Roger R. Schell:

Views for Multilevel Database Security. 129-140 - J. Thomas Haigh, William D. Young:

Extending the Noninterference Version of MLS for SAT. 141-150 - J. Daniel Halpern, Sam Owre, Norman Proctor, William F. Wilson:

Muse - A Computer Assisted Verification System. 151-156 - J. Thomas Haigh, Richard A. Kemmerer, John McHugh, William D. Young:

An Experience Using Two Covert Channel Analysis Techniques on a Real System Design. 157-168 - Virgil D. Gligor, C. Sekar Chandersekaran, Wen-Der Jiang, Abhai Johri, Gary L. Luckenbaugh, L. Edward Reich:

A New Security Testing Method and Its Application to the Secure Xenix Kernel. 169-183 - Daniel M. Berry:

Towards a Formal Basis for the Formal Development Method and the Ina Jo Specification Language. 184-201 - Richard Y. Kain, Carl E. Landwehr:

On Access Checking in Capability-Based Systems. 202-207 - Virgil D. Gligor, C. Sekar Chandersekaran, Robert S. Chapman, Leslie J. Dotterer, Matthew S. Hecht, Wen-Der Jiang, Abhai Johri, Gary L. Luckenbaugh, N. Vasudevan:

Design and Implementation of Secure Xenix. 208-221 - Dorothy E. Denning:

An Intrusion-Detection Model. 222-232 - Dan M. Nessett:

Factors Affecting Distributed System Security. 233-248 - Deborah Estrin:

Controls for Interorganization Networks. 249-261 - Judy H. Moore, Gustavus J. Simmons:

Cycle Structure of the DES for Keys Having Palindromic (or Antipalindromic) Sequences of Round Keys. 262-273 - Jonathan K. Millen, Sidney C. Clark, Sheryl B. Freedman:

The Interrogator: Protocol Security Analysis. 274-288 - Catherine Meadows, David Mutchler:

Matching Secrets in the Absence of a Continuously Available Trusted Authority. 289-292 - C. Gray Girling:

Covert Channels in LAN's. 292-296
Volume 13, Number 3, March 1987
- Norman F. Schneidewind:

The State of Software Maintenance. 303-310 - Salah Bendifallah, Walt Scacchi:

Understanding Software Maintenance Work. 311-323 - K. Narayanaswamy, Walt Scacchi:

Maintaining Configurations of Evolving Software Systems. 324-334 - Dennis G. Kafura, Geereddy R. Reddy:

The Use of Software Complexity Metrics in Software Maintenance. 335-343 - H. Dieter Rombach:

A Controlled Experiment on the Impact of Software Structure on Maintainability. 344-354 - Stephen S. Yau, Jeffrey J. P. Tsai:

Knowledge Representation of Software Component Interconnection Information for Large-Scale Software Modifications. 355-361 - Victor F. Nicola, Vidyadhar G. Kulkarni, Kishor S. Trivedi:

Queueing Analysis of Fault-Tolerant Computer Systems. 363-375 - Kenneth C. Sevcik, Marjory J. Johnson:

Cycle Time Properties Of The FDDI Token Ring Protocol. 376-385 - Nancy G. Leveson, Janice L. Stolzy:

Safety Analysis Using Petri Nets. 386-397 - Yogen K. Dalal:

A Distributed Algorithm for Constructing Minimal Spanning Trees. 398-405
Volume 13, Number 4, April 1987
- Claude Boksenbaum, Michèle Cart, Jean Ferrié, Jean-François Pons:

Concurrent Certifications by Intervals of Timestamps in Distributed Database Systems. 409-419 - Francis Y. L. Chin, K. V. S. Ramarao:

An Information-Based Model for Failure-Handling in Distributed Database Systems. 420-431 - Bruce I. Blum:

A Paradigm for Developing Information Systems. 432-439 - Roland T. Mittermeir, Marcus Oppitz:

Software Bases for the Flexible Composition of Application Systems. 440-460 - Kazuo Matsumura, Hiroyuki Mizutani, Masahiko Arai:

An Application of Structural Modeling to Software Requirements Analysis and Design. 461-471 - Václav Rajlich:

Refinement Methodology for Ada. 472-478 - Heather W. Robb, Heinz Roland Weistroffer:

Performance Criteria for Constrained Nonlinear Programming Codes. 479-489 - Frank G. Pagan:

Program Structure Charts for Applicative Languages. 490-497 - Zhongxiu Sun, Li Xining:

CSM: A Distributed Programming Language. 497-500 - Gregor von Bochmann, Jean-Pierre Verjus:

Some Comments on "Transition-Oriented" Versus "Structured" Specification of Distributed Algorithms and Protocols. 501-505
Volume 13, Number 5, May 1987
- Takeshi Chusho:

Test Data Selection and Quality Estimation Based on the Concept of Esssential Branches for Path Testing. 509-517 - Behçet Sarikaya, Gregor von Bochmann, Eduard Cerny:

A Test Design Methodology for Protocol Testing. 518-531 - Yogeesh H. Kamath, Manton M. Matthews:

Implementation of an FP-Shell. 532-539 - Shmuel Katz, Oded Shmueli:

Cooperative Distributed Algorithms for Dynamic Cycle Prevention. 540-552 - John C. Knight, John I. A. Urquhart:

On the Implementation and Use of Ada on Fault-Tolerant Distributed Systems. 553-563 - Wei Zhao

, Krithi Ramamritham, John A. Stankovic:
Scheduling Tasks with Resource Requirements in Hard Real-Time Systems. 564-577 - Jan Magott:

New NP-Complete Problems in Performance Evaluation of Concurrent Systems Using Petri Nets. 578-581 - R. Keith Scott, James W. Gault, David F. McAllister:

Fault-Tolerant Software Reliability Modeling. 582-592 - Raghubir N. Mathur:

Methodology for Business System Development. 593-601 - Shigeru Masuyama, Toshihide Ibaraki, Shojiro Nishio, Toshiharu Hasegawa:

Shortest Semijoin Schedule for a Local Area Distributed Database System. 602-606
Volume 13, Number 6, June 1987
- Steven P. Reiss:

Automatic Compiler Production: The Front End. 609-627 - Kay-Ulrich Felgentreu, Wolfram-Manfred Lippe, Friedemann H. Simon:

Optimizing Static Scope Lisp by Repetitive Interpretation of Recursive Function Calls. 628-635 - F. Warren Burton, Dieter Maurer, Hans-Georg Oberhauser, Reinhard Wilhelm:

A Space-Efficient Optimization of Call-by-Need. 636-642 - Sajal K. Das

, V. K. Agrawal, Dilip Sarkar, Lalit M. Patnaik, Prem Shankar Goel:
Reflexive Incidence Matrix (RIM) Representation of Petri Nets. 643-653 - Rajive L. Bagrodia, K. Mani Chandy, Jayadev Misra:

A Message-Based Approach to Discrete-Event Simulation. 654-665 - Roger D. Schultz, Alfonso F. Cardenas:

An Approach and Mechanism for Auditable and Testable Advanced Transaction Processing Systems. 666-676 - Robert P. Roe, John H. Rowland:

Some Theory Concerning Certification of Mathematical Subroutines by Black Box Testing. 677-682 - Gerard J. Holzmann:

Automated Protocol Validation in Argos: Assertion Proving and Scatter Searching. 683-696 - Hon Fung Li, W. K. Cheung:

An Empirical Study of Software Metrics. 697-708 - S. Bing Yao, Alan R. Hevner, Hélène Young-Myers:

Analysis of Database System Architectures Using Benchmarks. 709-725 - Chuan-Qi Zhu, Pen-Chung Yew

:
A Scheme to Enforce Data Dependence on Large Multiprocessor Systems. 726-739 - S. Purushothaman, P. A. Subrahmanyam:

Reasoning About Probabilistic Behavior in Concurrent Systems. 740-745 - Michael J. Carey:

Improving the Performance of an Optimistic Concurrency Control Algorithm Through Timestamps and Versions. 746-760
Volume 13, Number 7, July 1987
- Ronald E. Prather, J. Paul Myers Jr.:

The Path Prefix Software Testing Strategy. 761-766 - Neal M. Bengtson:

Measuring Errors in Operational Analysis Assumptions. 767-776 - John C. Cherniavsky, Carl H. Smith:

A Recursion Theoretic Approach to Program Testing. 777-784 - Amihai Motro:

Superviews: Virtual Integration of Multiple Databases. 785-798 - Wiebren de Jonge, Andrew S. Tanenbaum

, Reind P. van de Riet:
Two Access Methods Using Compact Binary Trees. 799-810 - Sushil Jajodia, Frederick N. Springsteel:

Construction of Universal Instances for Loop-Free Network Databases Using a Join-Like Operation. 811-819 - John D. Gannon, Richard G. Hamlet, Harlan D. Mills:

Theory of Modules. 820-829 - Peter Freeman:

A Conceptual Analysis of the Draco Approach to Constructing Software Systems. 830-844 - David N. Card, Frank E. McGarry, Gerald T. Page:

Evaluating Software Engineering Technologies. 845-851 - D. Ross Jeffery:

Time-Sensitive Cost Models in the Commercial MIS Environment. 852-859 - S. Misbah Deen, R. R. Amin, Malcolm C. Taylor:

Data Integration in Distributed Databases. 860-864 - Colin M. Davidson:

A Note on Concurrent Programming Control. 865-866
Volume 13, Number 8, August 1987
- Satish K. Tripathi, Yennun Huang

, Sushil Jajodia:
Local Area Networks: Software and Related Issues. 872-879 - Brian N. Bershad, Dennis T. Ching, Edward D. Lazowska

, Jan Sanislo, Michael F. Schwartz:
A Remote Procedure Call Facility for Interconnecting Heterogeneous Computer Systems. 880-894 - Rita C. Summers:

A Resource Sharing System for Personal Computers in a LAN: Concepts, Design, and Experience. 895-904 - Rakesh Agrawal, Ahmed K. Ezzat:

Location Independent Remote Execution in NEST. 905-912 - Jürgen Nehmer, Dieter Haban, Friedemann Mattern, Dieter Wybranietz, H. Dieter Rombach:

Key Concepts of the INCAS Multicomputer Project. 913-923 - Pradeep Jain, Simon S. Lam:

Modeling and Verification of Real-Time Protocols for Broadcast Networks. 924-937 - Wei Zhao

, Krithi Ramamritham:
Virtual Time CSMA Protocols for Hard Real-Time Communication. 938-952 - David J. DeWitt, Raphael A. Finkel, Marvin H. Solomon:

The Crystal Multicomputer: Design and Implementation Experience. 953-966 - S. Ramesh, S. L. Mehndiratta:

A Methodology for Developing Distributed Programs. 967-976 - Je-Hao Wang, Tak-Sun Yuen, David Hung-Chang Du:

On Multiple Random Accesses and Physical Data Placement in Dynamic Files. 977-987
Volume 13, Number 9, September 1987
- Gregor von Bochmann, George Walter Gerber, Jean-Marc Serre:

Semiautomatic Implementation of Communication Protocols. 989-1000 - Guy T. Almes, Cara L. Holman:

Edmas: An Object-Oriented, Locally Distributed Mail System. 1001-1009 - Vijay Gurbaxani, Haim Mendelson:

Software and Hardware in Data Processing Budgets. 1010-1017 - Sam Yuan Sung:

Performance Analysis of Disk Modulo Allocation Method for Cartesian Product Files. 1018-1026 - Richard W. Selby, Victor R. Basili, F. Terry Baker:

Cleanroom Software Development: An Empirical Evaluation. 1027-1037 - Yuan Shi, Noah S. Prywes, Boleslaw K. Szymanski

, Amir Pnueli:
Very High Level Concurrent Programming. 1038-1046 - Sushil Jajodia:

An Extension of "Representative Instances and gamma-Acyclic Relational Schemes". 1047-1048
Volume 13, Number 10, October 1987
- Tony T. Lee:

An Information-Theoretic Analysis of Relational Databases - Part I: Data Dependencies and Information Metric. 1049-1061 - Tony T. Lee:

An Information-Theoretic Analysis of Relational Databases - Part II: Information Structures of Database Schemas. 1061-1072 - Abdel Aziz Farrag, M. Tamer Özsu

:
Towards a General Concurrency Control Algorithm for Database Systems. 1073-1079 - E. Timothy Morgan, Rami R. Razouk:

Interactive State-Space Analysis of Concurrent Systems. 1080-1091 - Hemant K. Jain:

A Comprehensive Model for the Design of Distributed Computer Systems. 1092-1104 - Robin A. Sahner, Kishor S. Trivedi:

Performance and Reliability Analysis Using Directed Acyclic Graphs. 1105-1114 - Kevin Rea, Robert de B. Johnston:

Automated Analysis of Discrete Communication Behavior. 1115-1126 - Krishna M. Kavi, Bill P. Buckles, U. Narayan Bhat:

Isomorphisms Between Petri Nets and Dataflow Graphs. 1127-1134 - Samiha Mourad, Dorothy Andrews:

On the Reliability of the IBM MVS/XA Operating. 1135-1139
Volume 13, Number 11, November 1987
- Peter Freeman:

Essential Elements of Software Engineering Education Revisited. 1143-1148 - Mark A. Ardis:

The Evolution of Wang Institute's Master of Software Engineering Program. 1149-1155 - David M. Weiss:

Teaching a Software Design Methodology. 1156-1163 - Jon Louis Bentley, John A. Dallen:

Exercises in Software Design. 1164-1169 - James E. Burns, Edward L. Robertson:

Two Complementary Course Sequences on the Design and Implementation of Software Products. 1170-1175 - David B. Wortman:

Software Projects in an Academic Environment. 1176-1181 - William M. McKeeman:

Experience with a Software Engineering Project Course. 1182-1192 - Laura M. Leventhal, Barbee T. Mynatt:

Components of Typical Undergraduate Software Engineering Courses: Results from a Survey. 1193-1198 - William E. Riddle, Lloyd G. Williams:

Technology Selection: An Educational Approach. 1199-1206 - Jonah Z. Lavi, Moshe I. Ben-Porat, Amram Ben-David:

IAI Corporate Software Engineering Training and Education Program. 1207-1216
Volume 13, Number 12, December 1987
- Sudhir Aggarwal, Daniel Barbará, Kalman Z. Meth:

SPANNER: A Tool for the Specification, Analysis, and Evaluation of Protocols. 1218-1237 - Pei-Jyun Leu, Bharat K. Bhargava:

Multidimensional Timestamp Protocols for Concurrency Control. 1238-1253 - Roger Hayes, Richard D. Schlichting:

Facilitating Mixed Language Programming in Distributed Systems. 1254-1264 - Veljko M. Milutinovic:

A Simulation Study of the Vertical-Migration Microprocessor Architecture. 1265-1277 - Victor R. Basili, Richard W. Selby:

Comparing the Effectiveness of Software Testing Strategies. 1278-1296 - Mark A. Holliday, Mary K. Vernon:

A Generalized Times Petri Net Model for Performance Analysis. 1297-1310 - K. H. Pun, Geneva G. Belford:

Performance Study of Two Phase Locking in Single-Site Database Systems. 1311-1328 - Y. H. Chin, Weng-Ling Peng:

An Evaluation of Two New Inference Control Methods. 1329-1339 - Somenath Biswas, V. Rajaraman:

An Algorithm to Decide Feasibility of Linear Integer Constraints Occurring in Decision Tables. 1340-1347 - Rakesh Agrawal, Michael J. Carey, Lawrence W. McVoy:

The Performance of Alternative Strategies for Dealing with Deadlocks in Database Management Systems. 1348-1363 - Norman Y. Foo:

Algebraic Specifications as Solutions of Implementation Equations. 1364-1369 - Hareton K. N. Leung, Hassan K. Reghbati:

Comments on Program Slicing. 1370-1371

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














