default search action
IEEE Transactions on Software Engineering (TSE), Volume 8
Volume 8, Number 1, January 1982
- Richard C. Waters:
The Programmer's Apprentice: Knowledge Based Programm Editing. 1-12 - Abha Moitra:
Direct Implementation of Algebraic Specification of Abstract Data Types. 12-20 - Jerald S. Schwarz:
Using Annotations to Make Recursion Equations Behave. 21-33
- Robert L. Probert:
Optimal Insertion of Software Probes in Well-Delimited Programs. 34-42 - Roger B. Dannenberg, George W. Ernst:
Formal Program Verification Using Symbolic Execution. 43-52
- Anthony Ephremides, Osama A. Mowafi:
Analysis of a Hybrid Access Scheme for Buffered Users-Probabilistic Time Division. 52-60 - Paula B. Hawthorn, David J. DeWitt:
Performance Analysis of Alternative Database Machine Architectures. 61-75 - Ashok K. Agrawala, Satish K. Tripathi, Glenn Ricart:
Adaptive Routing Using a Virtual Waiting Time Technique. 76-81
Volume 8, Number 2, February 1982
- John P. Kearns, Carol J. Meier, Mary Lou Soffa:
The Performance Evaluation of Control Implementations. 89-96 - Walid A. Abu-Sufah, David A. Padua:
Some Results on the Working Set Anomalies in Numerical Programs. 97-106 - Hanan Samet:
Code Optimization Considerations in List Processing Systems. 107-112 - Gilbert Harrus, Brigitte Plateau:
Queueing Analysis of a Reordering Issue. 113-123 - A. James Baroody Jr., David J. DeWitt:
The Impact of Run-Time Schema Interpretation in a Network Data Model DBMS. 123-136 - Lawrence A. Rowe, Kenneth P. Birman:
A Local Network Based on the UNIX Operating System. 137-146 - K. S. Shankar:
A Functional Approach to Module Verification. 147-160 - Marty Ossefort:
Corrigendum to "Proofs of Networks of Processes''. 160
Volume 8, Number 3, May 1982
- Bharat K. Bhargava:
Guest Editorial: Reliability Issues in Distributed Systems. 165-167 - Daniel R. Ries, Gordon C. Smith:
Nested Transactions in Distributed Systems. 167-172 - Toshimi Minoura, Gio Wiederhold:
Resilient Extended True-Copy Token Scheme for a Distributed Database System. 173-189 - K. H. Kim:
Approaches to Mechanization of the Conversation Scheme Based on Monitors. 189-197 - Michael J. Fischer, Nancy D. Griffeth, Nancy A. Lynch:
Global States of a Distributed System. 198-202 - Barbara Liskov:
On Linguistic Support for Distributed Programs. 203-210 - Yat-Sang Kwong, Derick Wood:
A New Method for Concurrency in B-Trees. 211-222 - Gultekin Özsoyoglu, Francis Y. L. Chin:
Enhancing the Security of Statistical Databases with a Question-Answering System and a Kernel Design. 223-234 - Chin-Chen Chang, Richard C. T. Lee, M. W. Du:
Symbolic Gray Code as a Perfect Multiattribute Hashing Scheme for Partial Match Queries. 235-249 - Pamela Zave:
An Operational Approach to Requirements Specification for Embedded Systems. 250-269 - Victor R. Basili, Harlan D. Mills:
Understanding and Documenting Programs. 270-283 - James L. Reuss:
Macro Implementation of a Structured Assembly Language. 284-287 - Nissim Francez, Michael Rodeh:
Achieving Distributed Termination without Freezing. 287-292
Volume 8, Number 4, July 1982
- Simonetta Balsamo, Giuseppe Iazeolla:
An Extension of Nortons's Theorem for Queueing Networks. 298-305 - John A. Stankovic:
Good System Structure Features: Their Complexity and Execution Time Cost. 306-318 - Leah J. Siegel, Howard Jay Siegel, Philip H. Swain:
Performance Measures for Evaluating Algorithms for SIMD Machines. 319-331 - Mamoru Maekawa, Yojiro Morimoto:
Performance Adjustment of an APL Interpreter. 331-343 - Franco Bazzichi, Ippolito Spadafora:
An Automatic Generator for Compiler Testing. 343-353 - C. V. Ramamoorthy, Farokh B. Bastani:
Software Reliability - Status and Perspectives. 354-371 - William E. Howden:
Weak Mutation Testing and Completeness of Test Sets. 371-379 - Lori A. Clarke, Johnette Hassell, Debra J. Richardson:
A Close Look at Domain Testing. 380-390 - Ernest J. H. Chang:
Echo Algorithms: Depth Parallel Operations on General Graphs. 391-401 - Timothy C. K. Chou, Jacob A. Abraham:
Load Balancing in Distributed Systems. 401-412 - T. C. Wesselkamper:
Computer Program Schemata and the Processes They Generate. 412-419 - Michel Dubois, Faye A. Briggs:
Performance of Synchronized Iterative Processes in Multiprocessor Systems. 419-431 - Franklin L. Vermeulen:
On the Combined Problem of Compaction and Sorting. 432-435 - John Kontos, George K. Papakonstantinou:
The Interpretation of Meta Grammars Describing Syntax-Directed Interpreters Using an Attribute Grammar Interpreter. 435-436 - Myron Lipow:
Number of Faults per Line of Code. 437-439 - Georges Gardarin, Michel A. Melkanoff:
Proving Consistency of Database Transactions Written in Extended Pascal. 440-446 - Glenn H. MacEwen:
Correction to "Information Flow Certification Using an Intermediate Code Programm Representation". 446
Volume 8, Number 5, September 1982
- Billy G. Claybrook:
A Specification Method for Specifying Data and Procedural Abstractions. 449-459 - Carl A. Sunshine, David H. Thompson, Roddy W. Erickson, Susan L. Gerhart, Daniel Schwabe:
Specification and Verification of Communication Protocols in AFFIRM Using State Transition Models. 460-489 - Martin S. Feather:
Program Specification Applied to a Text Formatter. 490-498 - Nan C. Shu, Vincent Y. Lum, F. C. Tung, Chin-Liang Chang:
Specification of Forms Processing and Business Procedures for Office Automation. 499-512 - John L. Gieser:
On Horizontally Microprogrammed Microarchitecture Description Techniques. 513-525 - James E. Archer Jr., Richard Conway:
Display Condensation of Program Text. 526-529 - Shovonlal Kundu:
On a Class of Linear Maps for Data Compression. 530-532
Volume 8, Number 6, November 1982
- Haran Boral, David J. DeWitt, Dina Friedland, Nancy F. Jarrell, W. Kevin Wilkinson:
Implementation of the Database Machine DIRECT. 533-543 - S. Bing Yao, Vance E. Waddle, Barron C. Housel:
View Modeling and Integration Using the Functional Data Model. 544-553 - Gary S. Ho, C. V. Ramamoorthy:
Protocols for Deadlock Detection in Distributed Database Systems. 554-557 - Abraham Silberschatz, Zvi M. Kedem:
A Family of Locking Protocols for Database Systems that Are Modeled by Directed Graphs. 558-562 - Nick Roussopoulos:
The Logical Access Path Schema of a Database. 563-573 - Francis Y. L. Chin, Gultekin Özsoyoglu:
Auditing and Inference Control in Statistical Databases. 574-582 - Yang-Chang Hong, Stanley Y. W. Su:
A Mechanism for Database Protection in Cellular-Logic Devices. 583-596 - Abe Lockman, Naftaly H. Minsky:
Unidirectional Transport of Rights and Take-Grant Control. 597-604 - Narain H. Gehani:
Databases and Units of Measure. 605-611 - Haim Mendelson:
Analysis of Extendible Hashing. 611-619 - R. Nigel Horspool, Eric C. R. Hehner:
Comments on "A Method for Representing Data Items of Unlimites Length in a Computer Memory". 620-621
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.