Journal: IEEE Trans. Software Eng.

Volume 16, Issue 9

929 -- 931. Guest Editor s Introduction Formal Methods in Software Engineering
932 -- 948Andrew P. Moore. The Specification and Verified Decomposition of System Requirements Using CSP
949 -- 964F. Keith Hanna, Neil Daeche, Mark Longley. Specification and Verification Using Dependent Types
965 -- 979Andy Podgurski, Lori A. Clarke. A Formal Model of Program Dependences and Its Implications for Software Testing, Debugging, and Maintenance
980 -- 992Mark Moriconi, Timothy C. Winkler. Approximate Reasoning About the Semantic Effects of Program Changes
993 -- 1004Albert John Camilleri. Mechanizing CSP Trace Theory in Higher Order Logic
1005 -- 1023David M. Goldschlag. Mechanically Verifying Concurrent Programs with the Boyer-Moore Prover
1024 -- 1043Douglas R. Smith. KIDS: A Semiautomatic Program Development System
1044 -- 1057Stephen J. Garland, John V. Guttag, James J. Horning. Debugging Larch Shared Language Specifications
1058 -- 1075David Guaspari, Carla Marceau, Wolfgang Polak. Formal Verification of Ada Programs
1076 -- 1088Jeannette M. Wing. Using Larch to Specify Avalon/C++ Objects
1089 -- 1103K. T. Narayana, Sanjeev Dharap. Formal Specification of a Look Manager

Volume 16, Issue 8

777 -- 790Victor M. Markowitz, Johann A. Makowsky. Identifying Extended Entity-Relationship Object Structures in Relational Schemas
791 -- 806Bruno Ciciani, Daniel M. Dias, Balakrishna R. Iyer, Philip S. Yu. A Hybrid Distributed Centralized System Structure for Transaction Processing
807 -- 821Victor F. Nicola, Johannes M. Van Spanje. Comparative Analysis of Different Models of Checkpointing and Recovery
822 -- 828Valeria De Antonellis, Bruna Zonta. A Disciplined Approach to Office Analysis
829 -- 843Gerald M. Karam, Raymond J. A. Buhr. Starvation and Critical Race Analyzers for Ada
844 -- 857Larry J. Morell. A Theory of Fault-Based Testing
858 -- 869Adriano Valenzano, Paolo Montuschi, Luigi Ciminiera. Some Properties of Timed Token Medium Access Protocols
870 -- 879Bogdan Korel. Automated Software Test Data Generation
880 -- 896J. C. Huang. State Constraints and Pathwise Decomposition of Programs
897 -- 916Jeffrey J. P. Tsai, Kwang-Ya Fang, Horng-Yuan Chen, Yao-Dong Bi. A Noninterference Monitoring and Replay Mechanism for Real-Time Software Testing and Debugging
917 -- 927Luqi. A Graph Model for Software Evolution

Volume 16, Issue 7

677 -- 683Dilip Sarkar, Narsingh Deo. Estimating the Speedup in Parallel Parsing
684 -- 698In Kyung Ryu, Alexander Thomasian. Performance Analysis of Dynamic Locking with the No-Waiting Policy
699 -- 709Catherine E. Houstis. Module Allocation of Real-Time Applications to Distributed Systems
710 -- 722James W. Stamos, David K. Gifford. Implementing Remote Evaluation
723 -- 728Michael G. Burke, Barbara G. Ryder. A Critical Analysis of Incremental Iterative Data Flow Analysis Algorithms
729 -- 740L. J. Chmura, Anthony F. Norcio, T. J. Wicinski. Evaluating Software Design Processes by Analyzing Change Data Over Time
741 -- 754David Hemmendinger. Specifying Ada Server Tasks with Executable Formal Grammars
755 -- 775Simon S. Lam, A. Udaya Shankar. A Relational Notation for State Transition Systems

Volume 16, Issue 6

561 -- 562Thomas A. Berson, Steven B. Lipner. Guest Editors Introduction Security and Privacy
563 -- 568Daryl McCullough. A Hookup Theorem for Multilevel Security
569 -- 580Chii-Ren Tsai, Virgil D. Gligor, C. Sekar Chandersekaran. On the Identification of Covert Storage Channels in Secure Systems
581 -- 592Che-Fn Yu, Virgil D. Gligor. A Specification and Verification Method for Preventing Denial of Service
593 -- 607Teresa F. Lunt, Dorothy E. Denning, Roger R. Schell, Mark Heckman, William R. Shockley. The SeaView Security Model
608 -- 618Jeffrey L. Berger, Jeffrey Picciotto, John P. L. Woodward, Paul T. Cummings. Compartmented Mode Workstation: Prototype Highlights
619 -- 629Steve R. White, Liam Comerford. ABYSS: An Architecture for Software Protection
630 -- 638David Hildum, Jacques Cohen. A Language for Specifying Program Transformations
639 -- 646Soklei Leong, Stephen M. Jodis, Kevin J. Sullivan, Oliver Jiang, Paul A. D. de Maine. A Transportable Programming Language (TPL) System-II: The Bifunctional Compiler System
647 -- 659Wen-Pai Lu, Malur K. Sundareshan. A Model for Multilevel Security in Computer Networks
660 -- 673Michel Dubois, Christoph Scheurich. Memory Access Dependencies in Shared-Memory Multiprocessors

Volume 16, Issue 5

490 -- 497Gerald M. Karam. Computational Improvements in Prolog Applications by Predicate Variable Pointers
498 -- 509Louise E. Moser. Data Dependency Graphs for Ada Programs
510 -- 522Luiz A. Laranjeira. Software Size Estimation of Object-Oriented Systems
523 -- 536Toshinori Suzuki, Sol M. Shatz, Tadao Murata. A Protocol Modeling and Verification Approach Based on a Specification Language and Petri Nets
537 -- 542Daniel Hoffman. On Criteria for Module Interfaces
543 -- 557Chen Ding, Prabhaker Mateti. A Framework for the Automated Drawing of Data Structure Diagrams
558 -- 560James K. Mullin. Optimal Semijoins for Distributed Database Systems

Volume 16, Issue 4

373 -- 388Leo Yuhsiang Liu, R. K. Shyamasundar. Static Analysis of Real-Time Distributed Systems
389 -- 402Judy M. Bishop. The Effect of Data Abstraction on Loop Programming Techniques
403 -- 414David Harel, Hagi Lachover, Amnon Naamad, Amir Pnueli, Michal Politi, Rivi Sherman, Aharon Shtull-Trauring, Mark B. Trakhtenbrot. STATEMATE: A Working Environment for the Development of Complex Reactive Systems
415 -- 420Alon Itai, Shay Kutten, Yaron Wolfstahl, Shmuel Zaks. Optimal Distributed t-Resilient Election in Complete Networks
421 -- 431Rajiv Gupta, Mary Lou Soffa. Region Scheduling: An Approach for Detecting and Redistributing Parallelism
432 -- 443Nancy G. Leveson, Stephen S. Cha, John C. Knight, Timothy J. Shimeall. The Use of Self Checks and Voting in Software Error Detection: An Empirical Study
444 -- 457Yuan-Bao Shieh, Dipak Ghosal, Prasad R. Chintamaneni, Satish K. Tripathi. Modeling of Hierarchical Distributed Systems with Fault-Tolerance
458 -- 470Sarah Brocklehurst, P. Y. Chan 0002, Bev Littlewood, John Snell. Recalibrating Software Reliability Models
471 -- 0Fred Kaudel. Comments on Allocating Programs Containing Branches and Loops Within a Multiple Processor System
472 -- 0Donald F. Towsley. Correction to Allocating Programs Containing Branches and Loops Within a Multiple Processor System
472 -- 477Robin A. Nicholl. Unreachable States in Model-Oriented Specifications
477 -- 483Margaret H. Eich, Sharon M. Garard. The Performance of Flow Graph Locking
483 -- 487David Callahan, Alan Carle, Mary W. Hall, Ken Kennedy. Constructing the Procedure Call Multigraph

Volume 16, Issue 3

261 -- 267Frank A. Feldman. A New Spectral Test for Nonrandomness and the DES
268 -- 280Kurt M. Olender, Leon J. Osterweil. Cecil: A Sequencing Constraint Language for Automatic Static Analysis Generation
281 -- 293Jean-Luc Gaudiot, Andrew Sohn. Data-Driven Parallel Production Systems
294 -- 301James R. Cordy, Nicholas L. Eliot, Michael G. Robertson. TuringTool: A User Interface to Aid in the Software Maintenance Task
302 -- 315Toshihide Ibaraki, Tiko Kameda, Naoki Katoh. Multiversion Cautious Schedulers for Database Concurrency Control
316 -- 324Wei-Tek Tsai, Dmitry Volovik, Thomas F. Keefe. Automated Test Case Generation for Programs Specified by Relational Algebra Queries
325 -- 334Yih-Farn Chen, Michael Y. Nishimoto, C. V. Ramamoorthy. The C Information Abstraction System
335 -- 349Saumya K. Debray, David Scott Warren. Towards Banishing the Cut from Prolog
350 -- 359Victor F. Nicola, Ambuj Goyal. Modeling of Correlated Failures and Community Error Recovery in Multiversion Software
360 -- 369Jia Xu, David Lorge Parnas. Scheduling Processes with Release Times, Deadlines, Precedence, and Exclusion Relations
370 -- 371Yutaka Hirakawa. Comments on On the Projection Method for Protocol Verification

Volume 16, Issue 2

109 -- 110Ravishankar K. Iyer. Guest Editor s Introduction Experimental Computer Science
111 -- 120James C. Browne, Taejae Lee, John Werth. Experimental Evaluation of a Reusability-Oriented Parallel Programming Environment
121 -- 128Elaine J. Weyuker. The Cost of Data Flow Testing: An Empirical Study
129 -- 140Barbara G. Ryder, William Landi, Hemant D. Pande. Profiling an Incremental Data Flow Analysis Algorithm
141 -- 152Ytzhak H. Levendel. Reliability Analysis of Large Software Systems: Defect Data Modeling
153 -- 165John P. J. Kelly, Susan C. Murphy. Achieving Dependability Throughout the Development Process: A Distributed Software Experiment
166 -- 182Jean Arlat, Martine Aguera, Louis Amat, Yves Crouzet, Jean-Charles Fabre, Jean-Claude Laprie, Eliane Martins, David Powell. Fault Injection for Dependability Validation: A Methodology and Some Applications
183 -- 196Vijay Balasubramanian, Prithviraj Banerjee. Tradeoffs in the Design of Efficient Algorithm-Based Error Detection Schemes for Hypercube Multiprocessors
197 -- 211Dieter Haban, Dieter Wybranietz. A Hybrid Monitor for Behavior and Performance Analysis of Distributed Systems
212 -- 216Michael H. Woodbury, Kang G. Shin. Measurement and Analysis of Workload Effects on Fault Latency in Real-Time Systems
216 -- 223Kyle Gallivan, Dennis Gannon, William Jalby, Allen D. Malony, Harry A. G. Wijshoff. Experimentally Characterizing the Behavior of Multiprocessor Memory Systems. A Case Study
223 -- 231Narasimhaiah Gorla, Alan C. Benander, Barbara A. Benander. Debugging Effort Estimation Using Software Metrics
231 -- 237Behzad Mortazavi. Performance of MAP in the Remote Operation of a CNC
238 -- 247Susan S. Brilliant, John C. Knight, Nancy G. Leveson. Analysis of Faults in an N-Version Software Experiment
248 -- 258Douglas W. Cornell, Philip S. Yu. An Effective Approach to Vertical Partitioning for Physical Design of Relational Databases

Volume 16, Issue 12

1325 -- 1336Mukesh Singhal. Update Transport: A New Technique for Update Synchronization in Replicated Database Systems
1337 -- 1343David H. Pitt, David Freestone. The Derivation of Conformance Tests from LOTOS Specifications
1344 -- 1351Jan Heering, Paul Klint, Jan Rekers. Incremental Generation of Parsers
1352 -- 1360David Alex Lamb. Specification of Iterators
1361 -- 1373Gruia-Catalin Roman, H. Conrad Cunningham. Mixed Programming Mataphors in a Shared Dataspace Model of Concurrency
1374 -- 1389Dieter Haban, Kang G. Shin. Application of Real-Time Monitoring to Scheduling Tasks with Random Execution Times
1390 -- 1401Mayez A. Al-Mouhamed. Lower Bound on the Number of Processors and Time for Scheduling Precedence Graphs with Communication Costs
1402 -- 1411Richard G. Hamlet, Ross Taylor. Partition Testing Does Not Inspire Confidence
1412 -- 1426M. Hakan Erdogmus, Robert Johnston. On the Specification and Synthesis of Communicating Processes
1427 -- 1432Jaroslaw Milewski. Functional Data Structures as Updatable Objects
1433 -- 1435Sheau-Dong Lang, Yannis Manolopoulos. Efficient Expressions for Completely and Partly Unsuccessful Batched Search of Tree-Structured Files
1435 -- 1439Gerald M. Karam. Comments on Measurement of Ada Overhead in OSI-Style Communications Systems
1439 -- 0Carole M. McNamee, Ronald A. Olsson. Comments on Critical Races in Ada Programs
1440 -- 0Larry L. Constantine. Comments on On Criteria for Module Interfaces

Volume 16, Issue 11

1225 -- 1234C. V. Ramamoorthy, Yutaka Usuda, Atul Prakash, Wei-Tek Tsai. The Evolution Support Environment System
1235 -- 1246Michela Degl Innocenti, Gian Luigi Ferrari, Giuliano Pacini, Franco Turini. RSF: A Formalism for Executable Requirement Specifications
1247 -- 1257Brent Hailpern, Harold Ossher. Extending Objects to Support Multiple Interfaces and Access Control
1258 -- 1272Michael V. Mannino, Injun Choi, Don S. Batory. The Object-Oriented Functional Data Language
1273 -- 1281Ichiro Suzuki. Formal Analysis of the Alternating Bit Protocol by Temporal Petri Nets
1282 -- 1292Yair Wand, Ron Weber. An Ontological Model of an Information System
1293 -- 1306Jeff Kramer, Jeff Magee. The Evolving Philosophers Problem: Dynamic Change Management
1307 -- 1310G. Becker, L. Camarinopoulos. A Bayesian Estimation Method for the Failure Rate a Possibly Correct Program
1311 -- 1316Valmir C. Barbosa. Strategies for the Prevention of Communication Deadlocks in Distributed Parallel Programs

Volume 16, Issue 10

1105 -- 1106Tadao Ichikawa, Shi-Kuo Chang. Guest Editors Introduction Visual Programming
1107 -- 1121Robert V. Rubin, James Walker II, Eric J. Golin. Early Experience with the Visual Programmer s WorkBench
1122 -- 1135Claudia Crimi, Angela Guercio, Giuliano Pacini, Genoveffa Tortora, Maurizio Tucci. Automating Visual Language Generation
1136 -- 1149Shi-Kuo Chang. A Visual Language Compiler for Information Retrieval by Visual Reasoning
1150 -- 1163Michele Angelaccio, Tiziana Catarci, Giuseppe Santucci. QBD*: A Graphical Query Language with Recursion
1164 -- 1177Marc Eisenstadt, John Domingue, Tim Rajan, Enrico Motta. Visual Knowledge Engineering
1178 -- 1184Masahito Hirakawa, Minoru Tanaka, Tadao Ichikawa. An Iconic Programming System, HI-VISUAL
1185 -- 1197Allan Heydon, Mark W. Maimone, J. D. Tygar, Jeannette M. Wing, Amy Moormann Zaremski. MirĂ³: Visual Specification of Security
1198 -- 1208David W. Craig, C. Murray Woodside. The Rejection Rate for Tasks with Random Arrivals, Deadlines, and Preemptive Scheduling
1209 -- 1220Gerald W. Neufeld, Yueli Yang. The Design and Implementation of an ASN.1-C Compiler

Volume 16, Issue 1

1 -- 12Christopher Paul Gerrard, Derek Coleman, Robin M. Gallimore. Formal Specification and Design Time Testing
13 -- 31Guo-Jie Li, Benjamin W. Wah. Computational Efficiency of Parallel Combinatorial OR-Tree Searches
32 -- 38Elena Barcucci, Renzo Pinzani, Renzo Sprugnoli. Optimal Selection of Secondary Indexes
39 -- 50Reg G. Willson, Bruce H. Krogh. Petri Net Tools for the Specification and Analysis of Discrete Controllers
51 -- 63Laura K. Dillon. Verifying General Safety Properties of Ada Tasking Programs
64 -- 71Graham C. Low, D. Ross Jeffery. Function Points in the Estimation and Evaluation of the Software Process
72 -- 81William E. Howden. Comments Analysis and Programming Errors
82 -- 91Ronald C. de Vries. Reducing Null Messages in Misra s Distributed Discrete Event Simulation Method
92 -- 99Surya B. Yadav. Control and Definition Modularization: An Improved Software Design Technique for Organizing Programs
100 -- 104Chung-Kuo Chang. Bidding Against Competitors