325 | -- | 342 | Simon S. Lam, A. Udaya Shankar. Protocol Verification via Projections |
343 | -- | 351 | Narain H. Gehani. Broadcasting Sequential Processes (BSP) |
352 | -- | 357 | Mark Weiser. Program Slicing |
358 | -- | 375 | Andreas Reuter, Horst Kinzinger. Automatic Design of the Internal Schema for a CODASYL Database System |
376 | -- | 383 | Willa Kay Wiener-Ehrlich, James R. Hamrick, Vincent F. Rupolo. Modeling Software Behavior in Terms of a Formal Life Cycle Curve: Implications for Software Maintenance |
384 | -- | 397 | H. G. Stuebing. A Software Engineering Environment (SEE) for Weapon System Software |
397 | -- | 407 | Iris Vessey, Ron Weber. Research on Structured Programming: An Empiricist s Evaluation |
414 | -- | 422 | William J. Stewart, Wayne P. Stohs. Some Equivalence Results for Load-Independent Exponential Queueing Networks |
422 | -- | 431 | Timo O. Alanko, Hannu Erkiƶ, Ilkka J. Haikala. Virtual Memory Behavior of Some Sorting Algorithms |
432 | -- | 437 | Jacek Jachner, Vinod K. Agarwal. Data Flow Anomaly Detection |
438 | -- | 444 | Joe W. Duran, Simeon C. Ntafos. An Evaluation of Random Testing |
444 | -- | 450 | Clement H. C. Leung, Qui Hoon Choo. On the Execution of Large Batch Programs in Unreliable Computing Systems |
451 | -- | 459 | Ramon F. Sarraga. Static Data Flow Analysis of PL/I Programs with the PROBE System |
459 | -- | 465 | John E. Gaffney Jr.. Estimating the Number of Faults in Code |
466 | -- | 471 | William Perrizo. A Method for Processing Distributed Database Queries |