3 | -- | 14 | Billy G. Claybrook, Anne-Marie Claybrook, James Williams. Defining Database Views as Data Abstractions |
15 | -- | 22 | C. Mohan, Donald S. Fussell, Zvi M. Kedem, Abraham Silberschatz. Lock Conversion in Non-Two-Phase Locking Protocols |
23 | -- | 31 | Flaviu Cristian. A Rigorous Approach to Fault-Tolerant Programming |
32 | -- | 43 | Richard A. Kemmerer. Testing Formal Specifications to Detect Design Errors |
43 | -- | 59 | Guy T. Almes, Andrew P. Black, Edward D. Lazowska, Jerre D. Noe. The Eden System: A Technical Review |
59 | -- | 67 | Mustaque Ahamad, Arthur J. Bernstein. An Application of Name Based Addressing to Low Level Distributed Algorithms |
67 | -- | 80 | Mukul K. Sinha, N. Natarajan. A Priority Based Distributed Deadlock Detection Algorithm |
80 | -- | 86 | B. Dasarathy. Timing Constraints of Real-Time Systems: Constructs for Expressing Them, Methods of Validating Them |
87 | -- | 96 | David B. Lomet. Making Pointers Safe in System Programming Languages |
97 | -- | 114 | Matthias Jarke, Jon A. Turner, Edward A. Stohr, Yannis Vassiliou, Norman H. White, Ken Michielsen. A Field Evaluation of Natural Language for Data Retrieval |
114 | -- | 124 | Jacques Cohen, Stuart Kolodner. Estimating the Speedup in Parallel Parsing |
125 | -- | 129 | Michael O. Fryer. Risk Assessment of Computer Controlled Systems |
130 | -- | 136 | Gilbert Harrus. A Model for the Basic Block Protocol of the Cambridge Ring |
136 | -- | 141 | Ariel Pashtan. Operating System Models in a Concurrent Pascal Environment: Complexity and Performance Considerations |