Journal: IEEE Trans. Software Eng.

Volume 8, Issue 6

533 -- 543Haran Boral, David J. DeWitt, Dina Friedland, Nancy F. Jarrell, W. Kevin Wilkinson. Implementation of the Database Machine DIRECT
544 -- 553S. Bing Yao, Vance E. Waddle, Barron C. Housel. View Modeling and Integration Using the Functional Data Model
554 -- 557Gary S. Ho, C. V. Ramamoorthy. Protocols for Deadlock Detection in Distributed Database Systems
558 -- 562Abraham Silberschatz, Zvi M. Kedem. A Family of Locking Protocols for Database Systems that Are Modeled by Directed Graphs
563 -- 573Nick Roussopoulos. The Logical Access Path Schema of a Database
574 -- 582Francis Y. L. Chin, Gultekin Özsoyoglu. Auditing and Inference Control in Statistical Databases
583 -- 596Yang-Chang Hong, Stanley Y. W. Su. A Mechanism for Database Protection in Cellular-Logic Devices
597 -- 604Abe Lockman, Naftaly H. Minsky. Unidirectional Transport of Rights and Take-Grant Control
605 -- 611Narain H. Gehani. Databases and Units of Measure
611 -- 619Haim Mendelson. Analysis of Extendible Hashing
620 -- 621R. Nigel Horspool, Eric C. R. Hehner. Comments on A Method for Representing Data Items of Unlimites Length in a Computer Memory

Volume 8, Issue 5

449 -- 459Billy G. Claybrook. A Specification Method for Specifying Data and Procedural Abstractions
460 -- 489Carl A. Sunshine, David H. Thompson, Roddy W. Erickson, Susan L. Gerhart, Daniel Schwabe. Specification and Verification of Communication Protocols in AFFIRM Using State Transition Models
490 -- 498Martin S. Feather. Program Specification Applied to a Text Formatter
499 -- 512Nan C. Shu, Vincent Y. Lum, F. C. Tung, Chin-Liang Chang. Specification of Forms Processing and Business Procedures for Office Automation
513 -- 525John L. Gieser. On Horizontally Microprogrammed Microarchitecture Description Techniques
526 -- 529James E. Archer Jr., Richard Conway. Display Condensation of Program Text
530 -- 532Shovonlal Kundu. On a Class of Linear Maps for Data Compression

Volume 8, Issue 4

298 -- 305Simonetta Balsamo, Giuseppe Iazeolla. An Extension of Nortons s Theorem for Queueing Networks
306 -- 318John A. Stankovic. Good System Structure Features: Their Complexity and Execution Time Cost
319 -- 331Leah J. Siegel, Howard Jay Siegel, Philip H. Swain. Performance Measures for Evaluating Algorithms for SIMD Machines
331 -- 343Mamoru Maekawa, Yojiro Morimoto. Performance Adjustment of an APL Interpreter
343 -- 353Franco Bazzichi, Ippolito Spadafora. An Automatic Generator for Compiler Testing
354 -- 371C. V. Ramamoorthy, Farokh B. Bastani. Software Reliability - Status and Perspectives
371 -- 379William E. Howden. Weak Mutation Testing and Completeness of Test Sets
380 -- 390Lori A. Clarke, Johnette Hassell, Debra J. Richardson. A Close Look at Domain Testing
391 -- 401Ernest J. H. Chang. Echo Algorithms: Depth Parallel Operations on General Graphs
401 -- 412Timothy C. K. Chou, Jacob A. Abraham. Load Balancing in Distributed Systems
412 -- 419T. C. Wesselkamper. Computer Program Schemata and the Processes They Generate
419 -- 431Michel Dubois, Faye A. Briggs. Performance of Synchronized Iterative Processes in Multiprocessor Systems
432 -- 435Franklin L. Vermeulen. On the Combined Problem of Compaction and Sorting
435 -- 436John Kontos, George K. Papakonstantinou. The Interpretation of Meta Grammars Describing Syntax-Directed Interpreters Using an Attribute Grammar Interpreter
437 -- 439M. Lipow. Number of Faults per Line of Code
440 -- 446Georges Gardarin, Michel A. Melkanoff. Proving Consistency of Database Transactions Written in Extended Pascal
446 -- 0Glenn H. MacEwen. Correction to Information Flow Certification Using an Intermediate Code Programm Representation

Volume 8, Issue 3

165 -- 167Bharat K. Bhargava. Guest Editorial: Reliability Issues in Distributed Systems
167 -- 172Daniel R. Ries, Gordon C. Smith. Nested Transactions in Distributed Systems
173 -- 189Toshimi Minoura, Gio Wiederhold. Resilient Extended True-Copy Token Scheme for a Distributed Database System
189 -- 197K. H. Kim. Approaches to Mechanization of the Conversation Scheme Based on Monitors
198 -- 202. Global States of a Distributed System
203 -- 210Barbara Liskov. On Linguistic Support for Distributed Programs
211 -- 222Yat-Sang Kwong, Derick Wood. A New Method for Concurrency in B-Trees
223 -- 234Gultekin Özsoyoglu, Francis Y. L. Chin. Enhancing the Security of Statistical Databases with a Question-Answering System and a Kernel Design
235 -- 249Chin-Chen Chang, Richard C. T. Lee, M. W. Du. Symbolic Gray Code as a Perfect Multiattribute Hashing Scheme for Partial Match Queries
250 -- 269Pamela Zave. An Operational Approach to Requirements Specification for Embedded Systems
270 -- 283Victor R. Basili, Harlan D. Mills. Understanding and Documenting Programs
284 -- 287James L. Reuss. Macro Implementation of a Structured Assembly Language
287 -- 292Nissim Francez, Michael Rodeh. Achieving Distributed Termination without Freezing

Volume 8, Issue 2

89 -- 96John P. Kearns, Carol J. Meier, Mary Lou Soffa. The Performance Evaluation of Control Implementations
97 -- 106Walid A. Abu-Sufah, David A. Padua. Some Results on the Working Set Anomalies in Numerical Programs
107 -- 112Hanan Samet. Code Optimization Considerations in List Processing Systems
113 -- 123Gilbert Harrus, Brigitte Plateau. Queueing Analysis of a Reordering Issue
123 -- 136A. James Baroody Jr., David J. DeWitt. The Impact of Run-Time Schema Interpretation in a Network Data Model DBMS
137 -- 146Lawrence A. Rowe, Kenneth P. Birman. A Local Network Based on the UNIX Operating System
147 -- 160K. S. Shankar. A Functional Approach to Module Verification
160 -- 0Marty Ossefort. Corrigendum to Proofs of Networks of Processes

Volume 8, Issue 1

1 -- 12Richard C. Waters. The Programmer s Apprentice: Knowledge Based Programm Editing
12 -- 20Abha Moitra. Direct Implementation of Algebraic Specification of Abstract Data Types
21 -- 33Jerald Schwarz. Using Annotations to Make Recursion Equations Behave
34 -- 42Robert L. Probert. Optimal Insertion of Software Probes in Well-Delimited Programs
43 -- 52Roger B. Dannenberg, George W. Ernst. Formal Program Verification Using Symbolic Execution
52 -- 60Anthony Ephremides, Osama A. Mowafi. Analysis of a Hybrid Access Scheme for Buffered Users-Probabilistic Time Division
61 -- 75Paula B. Hawthorn, David J. DeWitt. Performance Analysis of Alternative Database Machine Architectures
76 -- 81Ashok K. Agrawala, Satish K. Tripathi, Glenn Ricart. Adaptive Routing Using a Virtual Waiting Time Technique