


default search action
IEEE Transactions on Software Engineering (TSE), Volume 8
Volume 8, Number 1, January 1982
- Richard C. Waters:

The Programmer's Apprentice: Knowledge Based Programm Editing. 1-12 - Abha Moitra:

Direct Implementation of Algebraic Specification of Abstract Data Types. 12-20 - Jerald S. Schwarz:

Using Annotations to Make Recursion Equations Behave. 21-33
- Robert L. Probert:

Optimal Insertion of Software Probes in Well-Delimited Programs. 34-42 - Roger B. Dannenberg, George W. Ernst:

Formal Program Verification Using Symbolic Execution. 43-52
- Anthony Ephremides, Osama A. Mowafi:

Analysis of a Hybrid Access Scheme for Buffered Users-Probabilistic Time Division. 52-60 - Paula B. Hawthorn, David J. DeWitt:

Performance Analysis of Alternative Database Machine Architectures. 61-75 - Ashok K. Agrawala, Satish K. Tripathi, Glenn Ricart

:
Adaptive Routing Using a Virtual Waiting Time Technique. 76-81
Volume 8, Number 2, February 1982
- John P. Kearns, Carol J. Meier, Mary Lou Soffa:

The Performance Evaluation of Control Implementations. 89-96 - Walid A. Abu-Sufah, David A. Padua:

Some Results on the Working Set Anomalies in Numerical Programs. 97-106 - Hanan Samet:

Code Optimization Considerations in List Processing Systems. 107-112 - Gilbert Harrus, Brigitte Plateau:

Queueing Analysis of a Reordering Issue. 113-123 - A. James Baroody Jr.

, David J. DeWitt:
The Impact of Run-Time Schema Interpretation in a Network Data Model DBMS. 123-136 - Lawrence A. Rowe, Kenneth P. Birman

:
A Local Network Based on the UNIX Operating System. 137-146 - K. S. Shankar:

A Functional Approach to Module Verification. 147-160 - Marty Ossefort:

Corrigendum to "Proofs of Networks of Processes''. 160
Volume 8, Number 3, May 1982
- Bharat K. Bhargava:

Guest Editorial: Reliability Issues in Distributed Systems. 165-167 - Daniel R. Ries, Gordon C. Smith:

Nested Transactions in Distributed Systems. 167-172 - Toshimi Minoura, Gio Wiederhold:

Resilient Extended True-Copy Token Scheme for a Distributed Database System. 173-189 - K. H. Kim:

Approaches to Mechanization of the Conversation Scheme Based on Monitors. 189-197 - Michael J. Fischer, Nancy D. Griffeth, Nancy A. Lynch:

Global States of a Distributed System. 198-202 - Barbara Liskov:

On Linguistic Support for Distributed Programs. 203-210 - Yat-Sang Kwong, Derick Wood:

A New Method for Concurrency in B-Trees. 211-222 - Gultekin Özsoyoglu, Francis Y. L. Chin:

Enhancing the Security of Statistical Databases with a Question-Answering System and a Kernel Design. 223-234 - Chin-Chen Chang, Richard C. T. Lee, M. W. Du:

Symbolic Gray Code as a Perfect Multiattribute Hashing Scheme for Partial Match Queries. 235-249 - Pamela Zave:

An Operational Approach to Requirements Specification for Embedded Systems. 250-269 - Victor R. Basili, Harlan D. Mills:

Understanding and Documenting Programs. 270-283 - James L. Reuss:

Macro Implementation of a Structured Assembly Language. 284-287 - Nissim Francez, Michael Rodeh:

Achieving Distributed Termination without Freezing. 287-292
Volume 8, Number 4, July 1982
- Simonetta Balsamo, Giuseppe Iazeolla

:
An Extension of Nortons's Theorem for Queueing Networks. 298-305 - John A. Stankovic:

Good System Structure Features: Their Complexity and Execution Time Cost. 306-318 - Leah J. Siegel, Howard Jay Siegel, Philip H. Swain:

Performance Measures for Evaluating Algorithms for SIMD Machines. 319-331 - Mamoru Maekawa, Yojiro Morimoto:

Performance Adjustment of an APL Interpreter. 331-343 - Franco Bazzichi

, Ippolito Spadafora:
An Automatic Generator for Compiler Testing. 343-353 - C. V. Ramamoorthy, Farokh B. Bastani:

Software Reliability - Status and Perspectives. 354-371 - William E. Howden:

Weak Mutation Testing and Completeness of Test Sets. 371-379 - Lori A. Clarke, Johnette Hassell, Debra J. Richardson:

A Close Look at Domain Testing. 380-390 - Ernest J. H. Chang:

Echo Algorithms: Depth Parallel Operations on General Graphs. 391-401 - Timothy C. K. Chou, Jacob A. Abraham:

Load Balancing in Distributed Systems. 401-412 - T. C. Wesselkamper:

Computer Program Schemata and the Processes They Generate. 412-419 - Michel Dubois, Faye A. Briggs:

Performance of Synchronized Iterative Processes in Multiprocessor Systems. 419-431 - Franklin L. Vermeulen:

On the Combined Problem of Compaction and Sorting. 432-435 - John Kontos, George K. Papakonstantinou:

The Interpretation of Meta Grammars Describing Syntax-Directed Interpreters Using an Attribute Grammar Interpreter. 435-436 - Myron Lipow:

Number of Faults per Line of Code. 437-439 - Georges Gardarin, Michel A. Melkanoff:

Proving Consistency of Database Transactions Written in Extended Pascal. 440-446 - Glenn H. MacEwen:

Correction to "Information Flow Certification Using an Intermediate Code Programm Representation". 446
Volume 8, Number 5, September 1982
- Billy G. Claybrook:

A Specification Method for Specifying Data and Procedural Abstractions. 449-459 - Carl A. Sunshine, David H. Thompson, Roddy W. Erickson, Susan L. Gerhart, Daniel Schwabe

:
Specification and Verification of Communication Protocols in AFFIRM Using State Transition Models. 460-489 - Martin S. Feather:

Program Specification Applied to a Text Formatter. 490-498 - Nan C. Shu, Vincent Y. Lum, F. C. Tung, Chin-Liang Chang:

Specification of Forms Processing and Business Procedures for Office Automation. 499-512 - John L. Gieser:

On Horizontally Microprogrammed Microarchitecture Description Techniques. 513-525 - James E. Archer Jr., Richard Conway:

Display Condensation of Program Text. 526-529 - Shovonlal Kundu:

On a Class of Linear Maps for Data Compression. 530-532
Volume 8, Number 6, November 1982
- Haran Boral, David J. DeWitt, Dina Friedland, Nancy F. Jarrell, W. Kevin Wilkinson:

Implementation of the Database Machine DIRECT. 533-543 - S. Bing Yao, Vance E. Waddle, Barron C. Housel:

View Modeling and Integration Using the Functional Data Model. 544-553 - Gary S. Ho, C. V. Ramamoorthy:

Protocols for Deadlock Detection in Distributed Database Systems. 554-557 - Abraham Silberschatz, Zvi M. Kedem:

A Family of Locking Protocols for Database Systems that Are Modeled by Directed Graphs. 558-562 - Nick Roussopoulos:

The Logical Access Path Schema of a Database. 563-573 - Francis Y. L. Chin, Gultekin Özsoyoglu:

Auditing and Inference Control in Statistical Databases. 574-582 - Yang-Chang Hong, Stanley Y. W. Su:

A Mechanism for Database Protection in Cellular-Logic Devices. 583-596 - Abe Lockman, Naftaly H. Minsky:

Unidirectional Transport of Rights and Take-Grant Control. 597-604 - Narain H. Gehani:

Databases and Units of Measure. 605-611 - Haim Mendelson:

Analysis of Extendible Hashing. 611-619 - R. Nigel Horspool, Eric C. R. Hehner:

Comments on "A Method for Representing Data Items of Unlimites Length in a Computer Memory". 620-621

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














