Journal: IEEE Trans. Software Eng.

Volume 23, Issue 9

537 -- 549Nam-Yong Lee, Charles R. Litecky. An Empirical Study of Software Reuse with Special Attention to Ada
550 -- 571Riccardo Focardi, Roberto Gorrieri. The Compositional Security Checker: A Tool for the Verification of Information Flow Security Properties
572 -- 598Alberto Coen-Porisini, Carlo Ghezzi, Richard A. Kemmerer. Specification of Realtime Systems Using ASTRAL
599 -- 600Tarek F. Abdelzaher, Kang G. Shin. Comment on A Pre-Run-Time Scheduling Algorithm for Hard Real-Time Systems

Volume 23, Issue 8

473 -- 484Matthew J. Gallagher, V. Lakshmi Narasimhan. ADTEST: A Test Data Generation Suite for Ada Software Systems
485 -- 497Krichnakumar Pillai, V. S. S. Nair. A Model for Software Development Effort and Cost Estimation
498 -- 516David W. Binkley. Semantics Guided Regression Test Cost Reduction
517 -- 528Min-You Wu, Wei Shu. On Parallelization of Static Scheduling Algorithms
529 -- 532Nader B. Ebrahimi. On the Statistical Analysis of the Number of Errors Remaining in a Software Design Document after Inspection
533 -- 0Horst Zuse. Reply to: Property-Based Software Engineering Measurement

Volume 23, Issue 7

401 -- 417Gordon S. Novak. Software Reuse by Specialization of Generic Procedures Through Views
418 -- 436Arun Sen. The Role of Opportunism in the Software Design Reuse Process
437 -- 444David M. Cohen, Siddhartha R. Dalal, Michael L. Fredman, Gardner C. Patton. The AETG System: An Approach to Testing Based on Combinatiorial Design
445 -- 460Rym Mili, Ali Mili, Roland Mittermeir. Storing and Retrieving Software Conponents: A Refinement Based System
461 -- 472Lester J. Holtzblatt, Richard L. Piazza, Howard B. Reubenstein, Susan N. Roberts, David R. Harris. Design Recovery for Distributed Systems

Volume 23, Issue 6

329 -- 346Adam A. Porter, Harvey P. Siy, Carol A. Toman, Lawrence G. Votta. An Experiment ot Assess the Cost-Benefits of Code Inspections in Large Scale Software Development
347 -- 365Brad A. Myers, Richard G. McDaniel, Robert C. Miller, Alan S. Ferrency, Andrew Faulring, Bruce D. Kyle, Andrew Mickish, Alex Klimovitski, Patrick Doane. The Amulet Environment: New Models for Effective User Interface Software Development
366 -- 378Arup Mukherjee, Daniel P. Siewiorek. Measuring Software Dependability by Robustness Benchmarking
379 -- 387Qing Hu. Evaluating Alternative Software Production Functions
388 -- 400Ismael Ripoll, Alfons Crespo, Ana García-Fornes. An Optimal Algorithm for Scheduling Soft Aperiodic Tasks in Dynamic-Priority Preemptive Systems

Volume 23, Issue 5

267 -- 278Bruno Dutertre, Victoria Stavridou. Formal Requirements Analysis of an Avionics Control System
279 -- 295Gerard J. Holzmann. The Model Checker SPIN
296 -- 313Saeko Matsuura, Hironobu Kuruma, Shinichi Honiden. EVA: A Flexible Programming Method for Evolving Systems
314 -- 323Changqing Wang, David R. Musser. Dynamic Verification of C++ Generic Algorithms

Volume 23, Issue 4

203 -- 213Matt Kaufmann, J. Strother Moore. An Industrial Strength Theorem Prover for a Logic Based on Common Lisp
214 -- 223William D. Young. Comparing Verification Systems: Interactive Consistency in ACL2
224 -- 234Bard Bloom, Allan Cheng, Ashvin Dsouza. Using a Protean Language to Enhance Expressiveness in Specification
235 -- 245Erland Jonsson, Tomas Olovsson. A Quantitative Model of the Security Intrusion Process Based on Attacker Behavior
246 -- 259Filippo Lanubile, Giuseppe Visaggio. Extracting Reusable Funtions by Flow Graph-Based Program Slicing
260 -- 261Brian Henderson-Sellers. Corrigenda: Software Size Estimation of Object-Oriented Systems

Volume 23, Issue 3

129 -- 145Adam A. Porter, Philip M. Johnson. Assessing Software Review Meetings: Results of a Comparative Analysis of Two Experimental Studies
146 -- 156David S. Rosenblum, Elaine J. Weyuker. Using Coverage Information to Predict the Cost-Effectiveness of Regression Testing Strategies
157 -- 170Murali Sitaraman, Bruce W. Weide, William F. Ogden. On the Practical Need for Abstraction Relations to Verify Abstract Data Type Representations
171 -- 184Jason Jen-Yen Chen. CSPL: An Ada95-Like, Unix-Based Process Environment
185 -- 186Martín Abadi. Explicit Communication Revisited: Two New Attacks on Authentication Protocols
187 -- 188Sandro Morasca, Lionel C. Briand, Victor R. Basili, Elaine J. Weyuker, Marvin V. Zelkowitz. Comments on Toward a Framework for Software Measurement Validation
189 -- 0Barbara A. Kitchenham, Shari Lawrence Pfleeger, Norman E. Fenton. Reply to: Comments on Toward a Framework for Software Measurement Validation
190 -- 195Geert Poels, Guido Dedene. Comments on Property-Based Software Engineering Measurement: Refining the Additivity Properties
196 -- 197Lionel C. Briand, Sandro Morasca, Victor R. Basili. Response to: Comments on Property-Based Software Engineering Measurement: Refining the Additivity Properties

Volume 23, Issue 2

67 -- 84Don S. Batory, Bart J. Geraci. Composition Validation and Subjectivity in GenVoca Generators
83 -- 92Stephen H. Edwards. Representation Inheritance: A Safe Form of White Box Code Inheritance
93 -- 106Wu-chun Feng, Jane W.-S. Liu. Algorithms for Scheduling Real-Time Tasks with Input Error and End-to-End Deadlines
107 -- 123Andy J. Wellings, Alan Burns. Implementing Atomic Actions in Ada 95

Volume 23, Issue 12

745 -- 758Dar-Tzen Peng, Kang G. Shin, Tarek F. Abdelzaher. Assignment and Scheduling Communicating Periodic Tasks in Distributed Real-Time Systems
759 -- 776David B. Stewart, Richard Volpe, Pradeep K. Khosla. Design of Dynamically Reconfigurable Real-Time Software Using Port-Based Objects
777 -- 799Gennaro Costagliola, Andrea De Lucia, Sergio Orefice, Genoveffa Tortora. A Parsing Methodology for the Implementation of Visual Systems

Volume 23, Issue 11

673 -- 683Bev Littlewood, David Wright. Some Conservative Stopping Rules for the Operational Testing of Safety-Critical Software
684 -- 721Chris J. Walter, Patrick Lincoln, Neeraj Suri. Formally Verified On-Line Diagnosis
722 -- 735Rohit Mahajan, Ben Shneiderman. Visual and Textual Consistency Checking Tools for Graphical User Interfaces
736 -- 743Martin J. Shepperd, Chris Schofield. Estimating Software Project Effort Using Analogies

Volume 23, Issue 10

603 -- 615Jun Sun 0002, Mark K. Gardner, Jane W.-S. Liu. Bounding Completion Times of Jobs with Arbitrary Release Times, Variable Execution Times and Resource Sharing
616 -- 634Ashish Mehra, Atri Indiresan, Kang G. Shin. Structuring Communication Software for Quality-of-Service Guarantees
635 -- 645Aloysius K. Mok, Deji Chen. A Multiframe Model for Real-Time Tasks
646 -- 658Koenraad Audenaert. Clock Trees: Logical Clocks for Programs with Nested Parallelism
659 -- 669Gavin Lowe, A. W. Roscoe. Using CSP to Detect Errors in the TMN Protocol

Volume 23, Issue 1

4 -- 16Yong Yan, Xiaodong Zhang, Qian Ma. Software Support for Multiprocessor Latency Measurement and Evaluation
17 -- 34Bogdan Korel. Computation of Dynamic Program Slices for Unstructured Programs
35 -- 55Peter Triantafillou, Carl Neilson. Achieving Strong Consistency in a Distributed File System
56 -- 59Robert J. Hilderman, Howard J. Hamilton. A Note on Regeneration with Virtual Copies