default search action
IEEE Transactions on Software Engineering (TSE), Volume 13
Volume 13, Number 1, January 1987
- Israel Cidon, Jeffrey M. Jaffe, Moshe Sidi:
Local Distributed Deadlock Detection by Cycle Detection and Clustering. 3-14 - W. Kent Fuchs, Kun-Lung Wu, Jacob A. Abraham:
Comparison and Diagnosis of Large Replicated Files. 15-22 - Richard Koo, Sam Toueg:
Checkpointing and Rollback-Recovery for Distributed Systems. 23-31 - Frank C. H. Lin, Robert M. Keller:
The Gradient Model Load Balancing Method. 32-38 - Sunil K. Sarin, Nancy A. Lynch:
Discarding Obsolete Information in a Replicated Database System. 39-47 - Douglas B. Terry:
Caching Hints in Distributed Systems. 48-54 - William E. Weihl:
Distributed Version Management for Read-Only Actions. 55-64 - Andrew P. Black, Norman C. Hutchinson, Eric Jul, Henry M. Levy, Larry Carter:
Distribution and Abstract Types in Emerald. 65-76 - Phillip B. Gibbons:
A Stub Generator for Multilanguage RPC in Heterogeneous Environments. 77-87 - Michael L. Scott:
Language Support for Loosely Coupled Distributed Programs. 88-103 - Gregory R. Andrews, Richard D. Schlichting, Roger Hayes, Titus D. M. Purdin:
The Design of the Saguaro Distributed Operating System. 104-118
Volume 13, Number 2, February 1987
- Dorothy E. Denning, Selim G. Akl, Mark R. Heckman, Teresa F. Lunt, Matthew Morgenstern, Peter G. Neumann, Roger R. Schell:
Views for Multilevel Database Security. 129-140 - J. Thomas Haigh, William D. Young:
Extending the Noninterference Version of MLS for SAT. 141-150 - J. Daniel Halpern, Sam Owre, Norman Proctor, William F. Wilson:
Muse - A Computer Assisted Verification System. 151-156 - J. Thomas Haigh, Richard A. Kemmerer, John McHugh, William D. Young:
An Experience Using Two Covert Channel Analysis Techniques on a Real System Design. 157-168 - Virgil D. Gligor, C. Sekar Chandersekaran, Wen-Der Jiang, Abhai Johri, Gary L. Luckenbaugh, L. Edward Reich:
A New Security Testing Method and Its Application to the Secure Xenix Kernel. 169-183 - Daniel M. Berry:
Towards a Formal Basis for the Formal Development Method and the Ina Jo Specification Language. 184-201 - Richard Y. Kain, Carl E. Landwehr:
On Access Checking in Capability-Based Systems. 202-207 - Virgil D. Gligor, C. Sekar Chandersekaran, Robert S. Chapman, Leslie J. Dotterer, Matthew S. Hecht, Wen-Der Jiang, Abhai Johri, Gary L. Luckenbaugh, N. Vasudevan:
Design and Implementation of Secure Xenix. 208-221 - Dorothy E. Denning:
An Intrusion-Detection Model. 222-232 - Dan M. Nessett:
Factors Affecting Distributed System Security. 233-248 - Deborah Estrin:
Controls for Interorganization Networks. 249-261 - Judy H. Moore, Gustavus J. Simmons:
Cycle Structure of the DES for Keys Having Palindromic (or Antipalindromic) Sequences of Round Keys. 262-273 - Jonathan K. Millen, Sidney C. Clark, Sheryl B. Freedman:
The Interrogator: Protocol Security Analysis. 274-288 - Catherine Meadows, David Mutchler:
Matching Secrets in the Absence of a Continuously Available Trusted Authority. 289-292 - C. Gray Girling:
Covert Channels in LAN's. 292-296
Volume 13, Number 3, March 1987
- Norman F. Schneidewind:
The State of Software Maintenance. 303-310 - Salah Bendifallah, Walt Scacchi:
Understanding Software Maintenance Work. 311-323 - K. Narayanaswamy, Walt Scacchi:
Maintaining Configurations of Evolving Software Systems. 324-334 - Dennis G. Kafura, Geereddy R. Reddy:
The Use of Software Complexity Metrics in Software Maintenance. 335-343 - H. Dieter Rombach:
A Controlled Experiment on the Impact of Software Structure on Maintainability. 344-354 - Stephen S. Yau, Jeffrey J. P. Tsai:
Knowledge Representation of Software Component Interconnection Information for Large-Scale Software Modifications. 355-361 - Victor F. Nicola, Vidyadhar G. Kulkarni, Kishor S. Trivedi:
Queueing Analysis of Fault-Tolerant Computer Systems. 363-375 - Kenneth C. Sevcik, Marjory J. Johnson:
Cycle Time Properties Of The FDDI Token Ring Protocol. 376-385 - Nancy G. Leveson, Janice L. Stolzy:
Safety Analysis Using Petri Nets. 386-397 - Yogen K. Dalal:
A Distributed Algorithm for Constructing Minimal Spanning Trees. 398-405
Volume 13, Number 4, April 1987
- Claude Boksenbaum, Michèle Cart, Jean Ferrié, Jean-François Pons:
Concurrent Certifications by Intervals of Timestamps in Distributed Database Systems. 409-419 - Francis Y. L. Chin, K. V. S. Ramarao:
An Information-Based Model for Failure-Handling in Distributed Database Systems. 420-431 - Bruce I. Blum:
A Paradigm for Developing Information Systems. 432-439 - Roland T. Mittermeir, Marcus Oppitz:
Software Bases for the Flexible Composition of Application Systems. 440-460 - Kazuo Matsumura, Hiroyuki Mizutani, Masahiko Arai:
An Application of Structural Modeling to Software Requirements Analysis and Design. 461-471 - Václav Rajlich:
Refinement Methodology for Ada. 472-478 - Heather W. Robb, Heinz Roland Weistroffer:
Performance Criteria for Constrained Nonlinear Programming Codes. 479-489 - Frank G. Pagan:
Program Structure Charts for Applicative Languages. 490-497 - Zhongxiu Sun, Li Xining:
CSM: A Distributed Programming Language. 497-500 - Gregor von Bochmann, Jean-Pierre Verjus:
Some Comments on "Transition-Oriented" Versus "Structured" Specification of Distributed Algorithms and Protocols. 501-505
Volume 13, Number 5, May 1987
- Takeshi Chusho:
Test Data Selection and Quality Estimation Based on the Concept of Esssential Branches for Path Testing. 509-517 - Behçet Sarikaya, Gregor von Bochmann, Eduard Cerny:
A Test Design Methodology for Protocol Testing. 518-531 - Yogeesh H. Kamath, Manton M. Matthews:
Implementation of an FP-Shell. 532-539 - Shmuel Katz, Oded Shmueli:
Cooperative Distributed Algorithms for Dynamic Cycle Prevention. 540-552 - John C. Knight, John I. A. Urquhart:
On the Implementation and Use of Ada on Fault-Tolerant Distributed Systems. 553-563 - Wei Zhao, Krithi Ramamritham, John A. Stankovic:
Scheduling Tasks with Resource Requirements in Hard Real-Time Systems. 564-577 - Jan Magott:
New NP-Complete Problems in Performance Evaluation of Concurrent Systems Using Petri Nets. 578-581 - R. Keith Scott, James W. Gault, David F. McAllister:
Fault-Tolerant Software Reliability Modeling. 582-592 - Raghubir N. Mathur:
Methodology for Business System Development. 593-601 - Shigeru Masuyama, Toshihide Ibaraki, Shojiro Nishio, Toshiharu Hasegawa:
Shortest Semijoin Schedule for a Local Area Distributed Database System. 602-606
Volume 13, Number 6, June 1987
- Steven P. Reiss:
Automatic Compiler Production: The Front End. 609-627 - Kay-Ulrich Felgentreu, Wolfram-Manfred Lippe, Friedemann H. Simon:
Optimizing Static Scope Lisp by Repetitive Interpretation of Recursive Function Calls. 628-635 - F. Warren Burton, Dieter Maurer, Hans-Georg Oberhauser, Reinhard Wilhelm:
A Space-Efficient Optimization of Call-by-Need. 636-642 - Sajal K. Das, V. K. Agrawal, Dilip Sarkar, Lalit M. Patnaik, Prem Shankar Goel:
Reflexive Incidence Matrix (RIM) Representation of Petri Nets. 643-653 - Rajive L. Bagrodia, K. Mani Chandy, Jayadev Misra:
A Message-Based Approach to Discrete-Event Simulation. 654-665 - Roger D. Schultz, Alfonso F. Cardenas:
An Approach and Mechanism for Auditable and Testable Advanced Transaction Processing Systems. 666-676 - Robert P. Roe, John H. Rowland:
Some Theory Concerning Certification of Mathematical Subroutines by Black Box Testing. 677-682 - Gerard J. Holzmann:
Automated Protocol Validation in Argos: Assertion Proving and Scatter Searching. 683-696 - Hon Fung Li, W. K. Cheung:
An Empirical Study of Software Metrics. 697-708 - S. Bing Yao, Alan R. Hevner, Hélène Young-Myers:
Analysis of Database System Architectures Using Benchmarks. 709-725 - Chuan-Qi Zhu, Pen-Chung Yew:
A Scheme to Enforce Data Dependence on Large Multiprocessor Systems. 726-739 - S. Purushothaman, P. A. Subrahmanyam:
Reasoning About Probabilistic Behavior in Concurrent Systems. 740-745 - Michael J. Carey:
Improving the Performance of an Optimistic Concurrency Control Algorithm Through Timestamps and Versions. 746-760
Volume 13, Number 7, July 1987
- Ronald E. Prather, J. Paul Myers Jr.:
The Path Prefix Software Testing Strategy. 761-766 - Neal M. Bengtson:
Measuring Errors in Operational Analysis Assumptions. 767-776 - John C. Cherniavsky, Carl H. Smith:
A Recursion Theoretic Approach to Program Testing. 777-784 - Amihai Motro:
Superviews: Virtual Integration of Multiple Databases. 785-798 - Wiebren de Jonge, Andrew S. Tanenbaum, Reind P. van de Riet:
Two Access Methods Using Compact Binary Trees. 799-810 - Sushil Jajodia, Frederick N. Springsteel:
Construction of Universal Instances for Loop-Free Network Databases Using a Join-Like Operation. 811-819 - John D. Gannon, Richard G. Hamlet, Harlan D. Mills:
Theory of Modules. 820-829 - Peter Freeman:
A Conceptual Analysis of the Draco Approach to Constructing Software Systems. 830-844 - David N. Card, Frank E. McGarry, Gerald T. Page:
Evaluating Software Engineering Technologies. 845-851 - D. Ross Jeffery:
Time-Sensitive Cost Models in the Commercial MIS Environment. 852-859 - S. Misbah Deen, R. R. Amin, Malcolm C. Taylor:
Data Integration in Distributed Databases. 860-864 - Colin M. Davidson:
A Note on Concurrent Programming Control. 865-866
Volume 13, Number 8, August 1987
- Satish K. Tripathi, Yennun Huang, Sushil Jajodia:
Local Area Networks: Software and Related Issues. 872-879 - Brian N. Bershad, Dennis T. Ching, Edward D. Lazowska, Jan Sanislo, Michael F. Schwartz:
A Remote Procedure Call Facility for Interconnecting Heterogeneous Computer Systems. 880-894 - Rita C. Summers:
A Resource Sharing System for Personal Computers in a LAN: Concepts, Design, and Experience. 895-904 - Rakesh Agrawal, Ahmed K. Ezzat:
Location Independent Remote Execution in NEST. 905-912 - Jürgen Nehmer, Dieter Haban, Friedemann Mattern, Dieter Wybranietz, H. Dieter Rombach:
Key Concepts of the INCAS Multicomputer Project. 913-923 - Pradeep Jain, Simon S. Lam:
Modeling and Verification of Real-Time Protocols for Broadcast Networks. 924-937 - Wei Zhao, Krithi Ramamritham:
Virtual Time CSMA Protocols for Hard Real-Time Communication. 938-952 - David J. DeWitt, Raphael A. Finkel, Marvin H. Solomon:
The Crystal Multicomputer: Design and Implementation Experience. 953-966 - S. Ramesh, S. L. Mehndiratta:
A Methodology for Developing Distributed Programs. 967-976 - Je-Hao Wang, Tak-Sun Yuen, David Hung-Chang Du:
On Multiple Random Accesses and Physical Data Placement in Dynamic Files. 977-987
Volume 13, Number 9, September 1987
- Gregor von Bochmann, George Walter Gerber, Jean-Marc Serre:
Semiautomatic Implementation of Communication Protocols. 989-1000 - Guy T. Almes, Cara L. Holman:
Edmas: An Object-Oriented, Locally Distributed Mail System. 1001-1009 - Vijay Gurbaxani, Haim Mendelson:
Software and Hardware in Data Processing Budgets. 1010-1017 - Sam Yuan Sung:
Performance Analysis of Disk Modulo Allocation Method for Cartesian Product Files. 1018-1026 - Richard W. Selby, Victor R. Basili, F. Terry Baker:
Cleanroom Software Development: An Empirical Evaluation. 1027-1037 - Yuan Shi, Noah S. Prywes, Boleslaw K. Szymanski, Amir Pnueli:
Very High Level Concurrent Programming. 1038-1046 - Sushil Jajodia:
An Extension of "Representative Instances and gamma-Acyclic Relational Schemes". 1047-1048
Volume 13, Number 10, October 1987
- Tony T. Lee:
An Information-Theoretic Analysis of Relational Databases - Part I: Data Dependencies and Information Metric. 1049-1061 - Tony T. Lee:
An Information-Theoretic Analysis of Relational Databases - Part II: Information Structures of Database Schemas. 1061-1072 - Abdel Aziz Farrag, M. Tamer Özsu:
Towards a General Concurrency Control Algorithm for Database Systems. 1073-1079 - E. Timothy Morgan, Rami R. Razouk:
Interactive State-Space Analysis of Concurrent Systems. 1080-1091 - Hemant K. Jain:
A Comprehensive Model for the Design of Distributed Computer Systems. 1092-1104 - Robin A. Sahner, Kishor S. Trivedi:
Performance and Reliability Analysis Using Directed Acyclic Graphs. 1105-1114 - Kevin Rea, Robert de B. Johnston:
Automated Analysis of Discrete Communication Behavior. 1115-1126 - Krishna M. Kavi, Bill P. Buckles, U. Narayan Bhat:
Isomorphisms Between Petri Nets and Dataflow Graphs. 1127-1134 - Samiha Mourad, Dorothy Andrews:
On the Reliability of the IBM MVS/XA Operating. 1135-1139
Volume 13, Number 11, November 1987
- Peter Freeman:
Essential Elements of Software Engineering Education Revisited. 1143-1148 - Mark A. Ardis:
The Evolution of Wang Institute's Master of Software Engineering Program. 1149-1155 - David M. Weiss:
Teaching a Software Design Methodology. 1156-1163 - Jon Louis Bentley, John A. Dallen:
Exercises in Software Design. 1164-1169 - James E. Burns, Edward L. Robertson:
Two Complementary Course Sequences on the Design and Implementation of Software Products. 1170-1175 - David B. Wortman:
Software Projects in an Academic Environment. 1176-1181 - William M. McKeeman:
Experience with a Software Engineering Project Course. 1182-1192 - Laura M. Leventhal, Barbee T. Mynatt:
Components of Typical Undergraduate Software Engineering Courses: Results from a Survey. 1193-1198 - William E. Riddle, Lloyd G. Williams:
Technology Selection: An Educational Approach. 1199-1206 - Jonah Z. Lavi, Moshe I. Ben-Porat, Amram Ben-David:
IAI Corporate Software Engineering Training and Education Program. 1207-1216
Volume 13, Number 12, December 1987
- Sudhir Aggarwal, Daniel Barbará, Kalman Z. Meth:
SPANNER: A Tool for the Specification, Analysis, and Evaluation of Protocols. 1218-1237 - Pei-Jyun Leu, Bharat K. Bhargava:
Multidimensional Timestamp Protocols for Concurrency Control. 1238-1253 - Roger Hayes, Richard D. Schlichting:
Facilitating Mixed Language Programming in Distributed Systems. 1254-1264 - Veljko M. Milutinovic:
A Simulation Study of the Vertical-Migration Microprocessor Architecture. 1265-1277 - Victor R. Basili, Richard W. Selby:
Comparing the Effectiveness of Software Testing Strategies. 1278-1296 - Mark A. Holliday, Mary K. Vernon:
A Generalized Times Petri Net Model for Performance Analysis. 1297-1310 - K. H. Pun, Geneva G. Belford:
Performance Study of Two Phase Locking in Single-Site Database Systems. 1311-1328 - Y. H. Chin, Weng-Ling Peng:
An Evaluation of Two New Inference Control Methods. 1329-1339 - Somenath Biswas, V. Rajaraman:
An Algorithm to Decide Feasibility of Linear Integer Constraints Occurring in Decision Tables. 1340-1347 - Rakesh Agrawal, Michael J. Carey, Lawrence W. McVoy:
The Performance of Alternative Strategies for Dealing with Deadlocks in Database Management Systems. 1348-1363 - Norman Y. Foo:
Algebraic Specifications as Solutions of Implementation Equations. 1364-1369 - Hareton K. N. Leung, Hassan K. Reghbati:
Comments on Program Slicing. 1370-1371
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.