Journal: ACM SIGSOFT Software Engineering Notes

Volume 10, Issue 5

15 -- 23David Lorge Parnas. Software aspects of strategic defense systems
24 -- 27Jim Horning. Computing in support of battle management
28 -- 0Martin J. Moore. Software engineering and SDI
29 -- 0David Weiss. Strategic defense initiative software feasibility (panel): panel discussion at the 8th ICSE
30 -- 0Kyu Y. Lee. Response to Jim Horning's letter
31 -- 32David A. Nelson. Will the real SE metaphors please stand up!: (or, I never metaphor I didn't like!)
33 -- 36Martha Branstad, Leonard L. Tripp. Summary of SESAW III
37 -- 46Rudy Bazelmans. Evolution of configuration management
47 -- 59Vincent A. Mastro. Three dimensional system development
60 -- 61Rajeev Aggarwal. Management of dormant files
62 -- 72Jayashree Ramanathan, John M. Rose. TRIAD: beyond isolated systems for development-in-the-large and programming-in-the-small
73 -- 78Jayashree Ramanathan, Robert Vermilyer, Thorbjorn Anderson, John M. Rose. The use of a relational data base in method driven environments
79 -- 88Girish Parikh. Discovering the world of software maintenance: selected readings
89 -- 98Girish Parikh. Software maintenance: penny wise, program foolish

Volume 10, Issue 4

1 -- 0Dan Craigen, Donald I. Good. Overview of verification systems
2 -- 4David R. Musser. AIDS to hierarchical specification structuring and reusing theorems in AFFIRM-85
5 -- 6Michael K. Smith, Richard M. Cohen. Gypsy verification environment: status
7 -- 14Leo Marcus, Stephen D. Crocker, Jaisook Landauer. SDVS: a system for verifying microcode correctness
15 -- 16Stephen D. Crocker. Engineering requirements for production quality verification systems
17 -- 18Steven T. Eckmann, Richard A. Kemmerer. INATEST: an interactive environment for testing formal specifications
19 -- 25Daniel M. Berry. An Ina Jo® proof manager for the formal development method
26 -- 27Dan Putnam. The VERUS™ design verification system
28 -- 32Ole-Johan Dahl, Olaf Owe. A presentation of the specification and verification project "ABEL"
33 -- 34Dan Craigen, Mark Saaltink. An EVES update
35 -- 36S. Kamal Abdali, Ralph L. London. Exploiting workstations and displays in verification systems
37 -- 40Susan L. Gerhart. Prolog technology as a basis for verification systems
41 -- 43P. Michael Melliar-Smith, John Rushby. The enhanced HDM system for specification and verification
44 -- 47James G. Williams 0002, Charles H. Applebaum. The Practical Verification System Project
48 -- 0Donald I. Good, Robert S. Boyer, J. Strother Moore. A second generation verification environment
49 -- 50James G. Williams. Components of verification technology
51 -- 52Raymond J. Hookway. Verifying Ada programs
53 -- 54D. Cooper. Overview of Theorem Proving
55 -- 59Nachum Dershowitz, David A. Plaisted. Conditional rewriting
60 -- 0Nachum Dershowitz. Rewriting and verification
61 -- 62Brian T. Smith. Position paper to be presented at "Verification workshop III (verkshop III)" to be held in Watsonville, CA. Feb. 18-21, 1985
63 -- 66Deepak Kapur, Paliath Narendran. An equational approach to theorem proving in first-order predicate calculus
67 -- 68Deepak Kapur, G. Sivakumar. RRL: theorem proving environment based on rewriting techniques
69 -- 0Sam Owre. The Sytek theorem prover
70 -- 71William F. Wilson, Sam Owre. Programmable heuristics for theorem provers
72 -- 74Robert S. Boyer, Matt Kaufmann. A prototype theorem-prover for a higher-order functional language
75 -- 0Richard A. Kemmerer. Overview of foundations
76 -- 79Janice I. Glasgow, Glenn H. MacEwen. LUCID: a specification language for distributed systems
80 -- 81Dan Craigen. Some thoughts arising from a language design effort
82 -- 83Mark Saaltink. Relational semantics
84 -- 0Friedrich W. von Henke. Reasoning with Hoare sentences
85 -- 87John McLean. Two dogmas of program specification
87 -- 89. Old-fashioned logic for verification
90 -- 91Dan Putnam. Separating methodology and specification constructs
92 -- 94Mark R. Pixon. Enhancing FDM for the expression of concurrency requirements
95 -- 96Karl N. Levitt, R. Alan Whitehurst. Overview of applications
97 -- 100R. Alan Whitehurst. The need for an integrated design, implementation, verification and testing methodology
101 -- 102Ben Di Vito. Towards a definition of "Beyond AI" verification
102 -- 104Jeannette M. Wing. Beyond functional behavior: combining methods to specify different classes of properties of large systems
104 -- 106John McHugh, Karl A. Nyberg. Ada verification using existing tools
107 -- 0Carl E. Landwehr. Does program verification help?: how much?
108 -- 109Terry C. Vickers Benzel. Verification technology and the A1 criteria
110 -- 0Daniel Davis. Resource abstraction and validation
111 -- 112Carl E. Landwehr. Some lessons from formalizing a security model
113 -- 116Tad Taylor. Verkshop position paper
116 -- 118Norman Proctor. The restricted access processor: an example of formal verification
119 -- 125William Earl Boebert, Richard Y. Kain. The extended access matrix model of computer security
126 -- 129Ruaridh Macdonald. Verifying a real system design: some of the problems
129 -- 130R. Stokes. Some formal method activities in UK industry

Volume 10, Issue 3

24 -- 27Jerrold Heyman, William M. Lively. Syntax-directed editing revisited
28 -- 32Jeff Parker. Towards more intelligent programming environments
33 -- 36Les Belady, Charles Richter. The MCC software technology program
37 -- 39Vijay Kumar Garg. Functional composition: a mechanism to compose programs
40 -- 46Rosângela Dellosso Penteado, Paulo César Masiero, Fernão Stella R. Germano. Structure charts for Jackson system development
47 -- 48Mark D. Spinrad, Curt Abraham. The Wild-West Lifecycle (WILI)
49 -- 61Tom Gilb. Evolutionary Delivery versus the "waterfall model"
62 -- 0David J. Schultz. Standard for the software life-cycle process
63 -- 75Rudy Bazelmans. Productivity: the role of the tools group
76 -- 94Robert G. Reynolds. PARTIAL: a tool to monitor the stepwise refinement of Ada programs
95 -- 108Jean Renard Ward. UNIX as an environment for non-UNIX software development: a case history
109 -- 117. Abstracts in software engineering

Volume 10, Issue 2

12 -- 15. Questionnaire responses
19 -- 22W. D. Maurer, Tim E. Barrios. The parable of the two programmers, continued
23 -- 27Peter G. Neumann. Review of "The Sachertorte algorithm and other antidotes to computer anxiety" by John Shore. Viking 1985
28 -- 34Graham Tate, Thomas W. G. Docker. A rapid prototyping system based on data flow principles
35 -- 40Neil W. Rickert. A system for managing shared files
41 -- 44Patrick H. Loy. System partitioning: a critical and often belittled development phase
45 -- 0Rebecca Ann Lamb. More on software quality assurance
46 -- 0Sam Harbaugh. Beware of beware
47 -- 50Dick Dunn. The emerging social significance of the magnetic-tape write-enable ring
51 -- 57David P. Schwartz. Summary of IEEE CSM WG meeting #5, 23-25 Jan 85
58 -- 59Girish Parikh. Software maintenance news
60 -- 62Peter B. Henderson. Software development/programming environments
77 -- 117. Proceedings of the ACM Ada TEC "Future Ada environment workshop"
118 -- 125. Abstracts in software engineering

Volume 10, Issue 1

12 -- 0Eugene N. Miya. On "Software engineering"
19 -- 30J. L. Lawrence. Why is software always late?
31 -- 42J. L. Lawrence. The RC2000: a software success story
43 -- 46Bruce I. Blum. Understanding the software paradox
48 -- 51Dennis P. Geller. B-ware: contradictions in a software development plan
52 -- 57Lars Olenfeldt. A very short paper on the OBJECT/EVENT-ANALYSIS
58 -- 0Donald J. Reifer. Review of "Principles of productive software management" by Michael W. Evans, Pamela Piazza, and James B. Dolkes. John Wiley & Sons 1983
62 -- 67Kenneth A. Foster. Revision of an error sensitive test rule
74 -- 81. Abstracts in software engineering