Journal: IEEE Trans. Software Eng.

Volume 22, Issue 9

603 -- 614Muhammad A. Qureshi, William H. Sanders, Aad P. A. van Moorsel, Reinhard German. Algorithms for the Generation of State-Level Representations of Stochastic Activity Networks with General Reward Structures
615 -- 628Peter Kemper. Numerical Analysis of Superposed GSPNs
629 -- 639Rossano Gaeta. Efficient Discrete-Event Simulation of Colored Petri Nets
640 -- 653Varsha Mainkar, Kishor S. Trivedi. Sufficient Conditions for Existence of a Fixed Point in Stochastic Reward Net-Based Iterative Models
654 -- 664Matteo Sereno. Approximate Mean Value Analysis for Stochastic Marked Graphs
665 -- 686Martin P. Ward. Derivation of Data Intensive Algorithms by Formal Transformation: The Schnorr-Waite Graph Marking Algorithm
687 -- 688Tom Adams. Total Variance Approach to Software Reliability-Estimation

Volume 22, Issue 8

529 -- 551Gregg Rothermel, Mary Jean Harrold. Analyzing Regression Test Selection Techniques
552 -- 562Kuo-Chung Tai. Theory of Fault-Based Predicate Testing for Computer Programs
563 -- 579Kevin J. Sullivan, Ira Kalet, David Notkin. Evaluating The Mediator Method: Prism as a Case Study
580 -- 598Taizan Chan, Siu Leung Chung, Teck Hua Ho. An Economic Model to Estimate Software Rewriting and Replacement Times
599 -- 600Wladyslaw M. Turski. Reference Model for Smooth Growth of Software Systems

Volume 22, Issue 7

442 -- 460Mary Jean Harrold, Gregg Rothermel. Separate Computation of Alias Information for Reuse
461 -- 483James C. Corbett. Timing Analysis of Ada Tasking Programs
484 -- 495Daniel Jackson, Craig Damon. Elements of Style: Analyzing a Software Design Feature with a Counterexample Detector
496 -- 507Patrice Godefroid, Doron Peled, Mark G. Staskauskas. Using Partial-Order Methods in the Formal Validation of Industrial Concurrent Programs
508 -- 528Pamela Zave, Michael Jackson. Where Do Operations Come From: A Multiparadigm Specification Technique

Volume 22, Issue 6

361 -- 362David Notkin, D. Ross Jeffery. Guest Editorial: Introduction to the Special Section Best Papers of the 17th International Conference on Software Engineering (ICSE-17)
363 -- 377Mats Per Erik Heimdahl, Nancy G. Leveson. Completeness and Consistency in Hierarchical State-Based Requirements
378 -- 389Mark A. Ardis, John A. Chaves, Lalita Jategaonkar Jagadeesan, Peter Mataga, Carlos Puchol, Mark G. Staskauskas, James Von Olnhausen. A Framework for Evaluating Specification Methods for Reactive Systems Experience Report
390 -- 406Richard N. Taylor, Nenad Medvidovic, Kenneth M. Anderson, Jim Whitehead, Jason E. Robbins, Kari A. Nies, Peyman Oreizy, Deborah L. Dubrow. A Component- and Message-Based Architectural Style for GUI Software
407 -- 423Tomás Isakowitz, Robert J. Kauffman. Supporting Search for Reusable Software Objects
424 -- 437Anneliese Amschler Andrews, A. Marie Vans. Identification of Dynamic Comprehension Processes During Large Scale Maintenance

Volume 22, Issue 5

281 -- 282Catherine Meadows. Guest Editorial: Introduction to the Special Section - Best Papers of the 1995 IEEE Symposium on Security and Privacy
283 -- 293Olin Sibert, Phillip A. Porras, Robert Lindell. An Analysis of the Intel 80x86 Security Architecture and Implementations
294 -- 301Ross J. Anderson, S. Johann Bezuidenhoudt. On the Reliability of Electronic Payment Systems
302 -- 312Matthew K. Franklin, Michael K. Reiter. The Design and Implementation of a Secure Auction Service
313 -- 328Rajashekar Kailar. Accountability in Electronic Commerce Protocols
329 -- 338Myong H. Kang, Ira S. Moskowitz, Daniel C. Lee. A Network Pump
339 -- 360Salwa K. Abd-El-Hafiz, Victor R. Basili. A Knowledge-Based Approach to the Analysis of Loops

Volume 22, Issue 4

225 -- 247C. Donald Wilcox, Gruia-Catalin Roman. Reasoning About Places, Times, and Actions in the Presence of Mobility
248 -- 255Hong Zhu. A Formal Analysis of the Subsume Relation Between Software Test Adequacy Criteria
256 -- 266Frédéric Boussinot, Robert de Simone. The SL Synchronous Language
267 -- 271Martin Hitz, Behzad Montazeri. Chidamber and Kemerer s Metrics Suite: A Measurement Theory Perspective
271 -- 274Lin-Lin Wang. Thorough Investigation into An Improved Algorithm Based on Subset Closures for Synthesizing a Relational Database Scheme
274 -- 279William B. Frakes, Christopher J. Fox. Quality Improvement Using A Software Reuse Failure Modes Model

Volume 22, Issue 3

161 -- 180James C. Corbett. Evaluating Deadlock Detection Methods for Concurrent Software
181 -- 201Rajeev Alur, Thomas A. Henzinger, Pei-Hsin Ho. Automatic Symbolic Verification of Embedded Systems
202 -- 217Santanu Paul, Atul Prakash. A Query Algebra for Program Databases
218 -- 223Sanping Chen, Shirley Mills. A Binary Markov Process Model for Random Testing

Volume 22, Issue 2

97 -- 108Antonia Bertolino, Lorenzo Strigini. On the Use of Testability Measures for Dependability Assessment
109 -- 119Tsong Yueh Chen, Yuen-Tak Yu. On the Expected Number of Failures Detected by Subdomain Testing and Random Testing
120 -- 131Deepak Gupta, Pankaj Jalote, Gautam Barua. A Formal Framework for On-line Software Version Change
132 -- 152Christian Clémençon, Bodhisattwa Mukherjee, Karsten Schwan. Distributed Shared Abstractions (DSA) on Multiprocessor
153 -- 157Vaclav Rajlich, João H. Silva. Evolution and Reuse of Orthogonal Architecture
158 -- 159Kate Finney. Mathematical Notation in Formal Specification: Too Difficult for the Masses?

Volume 22, Issue 12

841 -- 865Sergio Bandinelli, Elisabetta Di Nitto, Alfonso Fuggetta. Supporting Cooperation in the SPADE-1 Environment
866 -- 874Yuri Chernak. A Statistical Approach to the Inspection Checklist Formal Synthesis and Improvement
875 -- 885Joseph D. Blackburn, Gary D. Scudder, Luk Van Wassenhove. Improving Speed and Productivity of Software Development: A Global Survey of Software Developers
886 -- 894Niclas Ohlsson, Hans Alberg. Predicting Fault-Prone Software Modules in Telephone Switches
895 -- 910Alain Abran, Pierre N. Robillard. Function Points Analysis: An Empirical Study of Its Measurement Processes
911 -- 0Robert H. Bourdeau, Betty H. C. Cheng. Correspondence: Response to Botting s Comments
911 -- 0Richard J. Botting. Comments on A Formal Semantics for Object Model Diagrams

Volume 22, Issue 11

777 -- 793Phil Stocks, David A. Carrington. A Framework for Specification-Based Testing
794 -- 811Matthew B. Dwyer, Lori A. Clarke. A Compact Petri Net Representation and Its Implications for Analysis
812 -- 826Peter Triantafillou. Independent Recovery in Large-Scale Distributed Systems
827 -- 838Hanoch Levy, Ted Messinger, Robert J. T. Morris. The Cache Assignment Problem and Its Application to Database Buffer Management

Volume 22, Issue 10

689 -- 705Eugenio Battiston, Fiorella de Cindio, Giancarlo Mauri. Modular Algebraic Nets to Specify Concurrent Systems
706 -- 718Katrina Maxwell, Luk Van Wassenhove, Soumitra Dutta. Software Development Productivity of European Space, Military, and Industrial Applications
719 -- 729Nicholas J. Puketza, Kui Zhang, Mandy Chung, Biswanath Mukherjee, Ronald A. Olsson. A Methodology for Testing Intrusion Detection Systems
730 -- 750Filomena Ferrucci, Genoveffa Tortora, Maurizio Tucci, Giuliana Vitiello. Semantics-Based Inference Algorithms for Adaptive Visual Environments
751 -- 761Victor R. Basili, Lionel C. Briand, Walcélio L. Melo. A Validation of Object-Oriented Design Metrics as Quality Indicators
762 -- 773F. Warren Burton. Guaranteeing Good Memory Bound for Parallel Programs

Volume 22, Issue 1

3 -- 5John McHugh. Guest Editorial: Introduction to the Special Section
6 -- 15Martín Abadi, Roger M. Needham. Prudent Engineering Practice for Cryptographic Protocols
16 -- 30Nevin Heintze, J. D. Tygar. A Model for Secure Protocols and Their Compositions
31 -- 42Michael K. Reiter. A Secure Group Membership Protocol
43 -- 52Li Gong, Xiaolei Qian. Computational Issues in Secure Interoperation
53 -- 67John McLean. A General Theory of Composition for a Class of Possibilistic Properties
68 -- 86Lionel C. Briand, Sandro Morasca, Victor R. Basili. Property-Based Software Engineering Measurement