Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/jss/jss3.bht:"
@article{DBLP:journals/jss/BatesW83, author = {Peter C. Bates and Jack C. Wileden}, title = {High-level debugging of distributed systems: The behavioral abstraction approach}, journal = {J. Syst. Softw.}, volume = {3}, number = {4}, pages = {255--264}, year = {1983}, url = {https://doi.org/10.1016/0164-1212(83)90011-0}, doi = {10.1016/0164-1212(83)90011-0}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/BatesW83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/Boehm83, author = {Barry W. Boehm}, title = {Seven basic principles of software engineering}, journal = {J. Syst. Softw.}, volume = {3}, number = {1}, pages = {3--24}, year = {1983}, url = {https://doi.org/10.1016/0164-1212(83)90003-1}, doi = {10.1016/0164-1212(83)90003-1}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/Boehm83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/BruggeH83, author = {Bernd Br{\"{u}}gge and Peter G. Hibbard}, title = {Generalized path expressions: {A} high-level debugging mechanism\({}^{\mbox{, }}\)}, journal = {J. Syst. Softw.}, volume = {3}, number = {4}, pages = {265--276}, year = {1983}, url = {https://doi.org/10.1016/0164-1212(83)90012-2}, doi = {10.1016/0164-1212(83)90012-2}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/BruggeH83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/BussolatiM83, author = {U. Bussolati and Giancarlo Martella}, title = {Security design in distributed database systems}, journal = {J. Syst. Softw.}, volume = {3}, number = {3}, pages = {219--229}, year = {1983}, url = {https://doi.org/10.1016/0164-1212(83)90036-5}, doi = {10.1016/0164-1212(83)90036-5}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jss/BussolatiM83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/Cargill83, author = {Thomas A. Cargill}, title = {The Blit debugger}, journal = {J. Syst. Softw.}, volume = {3}, number = {4}, pages = {277--284}, year = {1983}, url = {https://doi.org/10.1016/0164-1212(83)90013-4}, doi = {10.1016/0164-1212(83)90013-4}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/Cargill83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/ClaybrookH83, author = {Billy G. Claybrook and H. Rex Hartson}, title = {Language extensions for specifying program access control policies in programming languages}, journal = {J. Syst. Softw.}, volume = {3}, number = {2}, pages = {155--162}, year = {1983}, url = {https://doi.org/10.1016/0164-1212(83)90028-6}, doi = {10.1016/0164-1212(83)90028-6}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jss/ClaybrookH83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/Evangelist83, author = {W. M. Evangelist}, title = {Software complexity metric sensitivity to program structuring rules}, journal = {J. Syst. Softw.}, volume = {3}, number = {3}, pages = {231--243}, year = {1983}, url = {https://doi.org/10.1016/0164-1212(83)90037-7}, doi = {10.1016/0164-1212(83)90037-7}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/Evangelist83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/Fairley83, author = {Richard E. Fairley}, title = {Editor's introduction}, journal = {J. Syst. Softw.}, volume = {3}, number = {2}, pages = {105}, year = {1983}, url = {https://doi.org/10.1016/0164-1212(83)90023-7}, doi = {10.1016/0164-1212(83)90023-7}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/Fairley83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/Fairley83a, author = {Richard E. Fairley}, title = {Editor's introduction}, journal = {J. Syst. Softw.}, volume = {3}, number = {3}, pages = {185}, year = {1983}, url = {https://doi.org/10.1016/0164-1212(83)90032-8}, doi = {10.1016/0164-1212(83)90032-8}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/Fairley83a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/Fairley83b, author = {Richard E. Fairley}, title = {Editor's introduction}, journal = {J. Syst. Softw.}, volume = {3}, number = {4}, pages = {253--254}, year = {1983}, url = {https://doi.org/10.1016/0164-1212(83)90010-9}, doi = {10.1016/0164-1212(83)90010-9}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/Fairley83b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/Fritzson83, author = {Peter Fritzson}, title = {Symbolic debugging through incremental compilation in an integrated environment}, journal = {J. Syst. Softw.}, volume = {3}, number = {4}, pages = {285--294}, year = {1983}, url = {https://doi.org/10.1016/0164-1212(83)90014-6}, doi = {10.1016/0164-1212(83)90014-6}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/Fritzson83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/GentlemanH83, author = {W. Morven Gentleman and Henry Hoeksma}, title = {Hardware assisted high-level debugging}, journal = {J. Syst. Softw.}, volume = {3}, number = {4}, pages = {309--314}, year = {1983}, url = {https://doi.org/10.1016/0164-1212(83)90017-1}, doi = {10.1016/0164-1212(83)90017-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jss/GentlemanH83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/HamiltonZ83, author = {Margaret H. Hamilton and Saydean Zeldin}, title = {The functional life cycle model and its automation: {USE.IT}}, journal = {J. Syst. Softw.}, volume = {3}, number = {1}, pages = {25--62}, year = {1983}, url = {https://doi.org/10.1016/0164-1212(83)90004-3}, doi = {10.1016/0164-1212(83)90004-3}, timestamp = {Mon, 30 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/HamiltonZ83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/HartsonB83, author = {H. Rex Hartson and Earl J. Balliet}, title = {A model of enforcement relationships among database access control dependencies}, journal = {J. Syst. Softw.}, volume = {3}, number = {3}, pages = {201--217}, year = {1983}, url = {https://doi.org/10.1016/0164-1212(83)90035-3}, doi = {10.1016/0164-1212(83)90035-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jss/HartsonB83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/HorspoolL83, author = {R. Nigel Horspool and Jeffrey M. Laks}, title = {An improved block sequencing method for program restructuring}, journal = {J. Syst. Softw.}, volume = {3}, number = {3}, pages = {245--250}, year = {1983}, url = {https://doi.org/10.1016/0164-1212(83)90038-9}, doi = {10.1016/0164-1212(83)90038-9}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/HorspoolL83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/JardB83, author = {Claude Jard and Gregor von Bochmann}, title = {An approach to testing specifications}, journal = {J. Syst. Softw.}, volume = {3}, number = {4}, pages = {315--323}, year = {1983}, url = {https://doi.org/10.1016/0164-1212(83)90018-3}, doi = {10.1016/0164-1212(83)90018-3}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/JardB83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/JenningsO83, author = {Steven F. Jennings and Arthur E. Oldehoeft}, title = {An analysis of program execution on a recursive stream-oriented data flow architecture}, journal = {J. Syst. Softw.}, volume = {3}, number = {2}, pages = {147--154}, year = {1983}, url = {https://doi.org/10.1016/0164-1212(83)90027-4}, doi = {10.1016/0164-1212(83)90027-4}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jss/JenningsO83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/Joshi83, author = {Ramchandra D. Joshi}, title = {Software development for reliable software systems}, journal = {J. Syst. Softw.}, volume = {3}, number = {2}, pages = {107--121}, year = {1983}, url = {https://doi.org/10.1016/0164-1212(83)90024-9}, doi = {10.1016/0164-1212(83)90024-9}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/Joshi83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/Kornman83, author = {Brent D. Kornman}, title = {Pattern matching and pattern-directed invocation in systems programming languages}, journal = {J. Syst. Softw.}, volume = {3}, number = {1}, pages = {95--102}, year = {1983}, url = {https://doi.org/10.1016/0164-1212(83)90008-0}, doi = {10.1016/0164-1212(83)90008-0}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/Kornman83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/LevesonH83, author = {Nancy G. Leveson and Peter R. Harvey}, title = {Software fault tree analysis}, journal = {J. Syst. Softw.}, volume = {3}, number = {2}, pages = {173--181}, year = {1983}, url = {https://doi.org/10.1016/0164-1212(83)90030-4}, doi = {10.1016/0164-1212(83)90030-4}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/LevesonH83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/MiliR83, author = {Ali Mili and Donna S. Reese}, title = {Representation and manipulation of information systems: {A} simplified approach}, journal = {J. Syst. Softw.}, volume = {3}, number = {1}, pages = {85--93}, year = {1983}, url = {https://doi.org/10.1016/0164-1212(83)90007-9}, doi = {10.1016/0164-1212(83)90007-9}, timestamp = {Wed, 31 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/MiliR83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/NyariS83, author = {Erika Nyari and Harry M. Sneed}, title = {{SOFSPEC:} {A} pragmatic approach to automated specification verification}, journal = {J. Syst. Softw.}, volume = {3}, number = {3}, pages = {193--200}, year = {1983}, url = {https://doi.org/10.1016/0164-1212(83)90034-1}, doi = {10.1016/0164-1212(83)90034-1}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/NyariS83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/ONeill83, author = {Donald O'Neill}, title = {Integration engineering perspective}, journal = {J. Syst. Softw.}, volume = {3}, number = {1}, pages = {77--83}, year = {1983}, url = {https://doi.org/10.1016/0164-1212(83)90006-7}, doi = {10.1016/0164-1212(83)90006-7}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/ONeill83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/PoelS83, author = {Klaas G. van der Poel and Stephen R. Schach}, title = {A software metric for cost estimation and efficiency measurement in data processing system development}, journal = {J. Syst. Softw.}, volume = {3}, number = {3}, pages = {187--191}, year = {1983}, url = {https://doi.org/10.1016/0164-1212(83)90033-X}, doi = {10.1016/0164-1212(83)90033-X}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jss/PoelS83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/PowellL83, author = {Michael L. Powell and Mark A. Linton}, title = {A database model of debugging}, journal = {J. Syst. Softw.}, volume = {3}, number = {4}, pages = {295--300}, year = {1983}, url = {https://doi.org/10.1016/0164-1212(83)90015-8}, doi = {10.1016/0164-1212(83)90015-8}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/PowellL83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/SalisburyM83, author = {Alan B. Salisbury and John H. Manley}, title = {Editors' introduction}, journal = {J. Syst. Softw.}, volume = {3}, number = {1}, pages = {1}, year = {1983}, url = {https://doi.org/10.1016/0164-1212(83)90002-X}, doi = {10.1016/0164-1212(83)90002-X}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/SalisburyM83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/SedlmeyerTJ83, author = {Robert L. Sedlmeyer and William B. Thompson and Paul E. Johnson}, title = {Knowledge-based fault localization in debugging}, journal = {J. Syst. Softw.}, volume = {3}, number = {4}, pages = {301--307}, year = {1983}, url = {https://doi.org/10.1016/0164-1212(83)90016-X}, doi = {10.1016/0164-1212(83)90016-X}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/SedlmeyerTJ83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/Sneed83, author = {Harry M. Sneed}, title = {Softing software engineering system}, journal = {J. Syst. Softw.}, volume = {3}, number = {1}, pages = {63--76}, year = {1983}, url = {https://doi.org/10.1016/0164-1212(83)90005-5}, doi = {10.1016/0164-1212(83)90005-5}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/Sneed83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/Stavely83, author = {Allan M. Stavely}, title = {Modeling and projection in software development}, journal = {J. Syst. Softw.}, volume = {3}, number = {2}, pages = {137--146}, year = {1983}, url = {https://doi.org/10.1016/0164-1212(83)90026-2}, doi = {10.1016/0164-1212(83)90026-2}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/Stavely83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/Stuebing83, author = {H. G. Stuebing}, title = {Industrialization of weapon system software}, journal = {J. Syst. Softw.}, volume = {3}, number = {2}, pages = {163--171}, year = {1983}, url = {https://doi.org/10.1016/0164-1212(83)90029-8}, doi = {10.1016/0164-1212(83)90029-8}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/Stuebing83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/WiledenSRSS83, author = {Jack C. Wileden and John H. Sayler and William E. Riddle and Alan R. Segal and Allan M. Stavely}, title = {Behavior specification in a software design system}, journal = {J. Syst. Softw.}, volume = {3}, number = {2}, pages = {123--135}, year = {1983}, url = {https://doi.org/10.1016/0164-1212(83)90025-0}, doi = {10.1016/0164-1212(83)90025-0}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/WiledenSRSS83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.