


default search action
IEEE Transactions on Software Engineering (TSE), Volume 17
Volume 17, Number 1, January 1991
- Ikuo Nakata, Masataka Sassa:

Programming with Streams in a Pascal-Like Language. 1-9 - L. Beth Protsko, Paul G. Sorenson, J. Paul Tremblay, Douglas A. Schaefer:

Towards the Automatic Generation of Software Diagrams. 10-21 - Nick Roussopoulos, Leo Mark, Timos K. Sellis

, Christos Faloutsos
:
An Architecture for High Performance Engineering Information Systems. 22-33 - Ben A. Blake, Karsten Schwan:

Experimental Evaluation of a Real-Time Scheduler for a Multiprocessor System. 34-44 - Kuo-Chung Tai, Richard H. Carver, Evelyn E. Obaid:

Debugging Concurrent Ada Programs by Deterministic Execution. 45-63 - Norman C. Hutchinson, Larry L. Peterson:

The x-Kernel: An Architecture for Implementing Network Protocols. 64-76 - Timos K. Sellis

, Leonard D. Shapiro:
Query Optimization for Nontraditional Database Applications. 77-86 - Xiaodong Zhang:

Performance Measurement and Modeling to Evaluate Various Effects on a Shared Memory Multiprocessor. 87-93 - Mark Moriconi, Timothy C. Winkler:

Correction to "Approximate Reasoning About the Semantic Effects of Program Changes". 94
Volume 17, Number 2, February 1991
- Sadatoshi Kumagai, Tadao Murata, Shojiro Nishio:

Guest Editors' Introduction Special Section on Petri Net Performance Models. 97-98 - Gerard Florin, Stéphane Natkin:

Generalization of Queueing Network Product Form Solutions to Stochastic Petri Nets. 99-107 - William Henderson, Peter G. Taylor

:
Embedded Processes in Stochastic Petri Nets. 108-116 - Javier Campos

, Giovanni Chiola, Manuel Silva Suárez:
Ergodicity and Throughput Bounds of Petri Nets with Unique Consistent Firing Count Vector. 117-125 - Itsuo Hatono, Keiichi Yamagata, Hiroyuki Tamura:

Modeling and On-Line Scheduling of Flexible Manufacturing Systems Using Stochastic Petri Nets. 126-132 - Jason Gait:

Stability, Availability and Response in Network File Service. 133-140 - Richard W. Selby, Victor R. Basili:

Analyzing Error-Prone System Structure. 141-152 - James M. Purtilo, Pankaj Jalote:

An Environment for Developing Fault-Tolerant Software. 153-159 - Carlo Ghezzi, Dino Mandrioli, Sandro Morasca

, Mauro Pezzè
:
A Unified High-Level Petri Net Formalism for Time-Critical Systems. 160-172 - Timothy J. Shimeall, Nancy G. Leveson:

An Empirical Comparison of Software Fault Tolerance and Fault Elimination. 173-182 - Naftaly H. Minsky:

The Imposition of Protocols Over Open Distributed Systems. 183-195 - Watts S. Humphrey, Nozer D. Singpurwalla:

Predicting (Individual) Software Productivity. 196-207
Volume 17, Number 3, March 1991
- Alan M. Davis, Peter A. Freeman:

Guest Editors' Introduction Requirements Engineering. 210-211 - Pamela Zave:

An Insider's Evaluation of PAISLey. 212-225 - Howard B. Reubenstein, Richard C. Waters:

The Requirements Apprentice: Automated Assistance for Requirements Acquisition. 226-240 - Matthew S. Jaffe, Nancy G. Leveson, Mats Per Erik Heimdahl, Bonnie E. Melhart:

Software Requirements Analysis for Real-Time Process-Control Systems. 241-258 - Bernard Berthomieu, Michel Diaz:

Modeling and Verification of Time Dependent Systems Using Time Petri Nets. 259-273 - Farhad S. Etessami, Gurdeep S. Hura:

Rule-Based Design Methodology for Solving Control Problems. 274-282 - Dewayne E. Perry, Gail E. Kaiser:

Models of Software Development Environments. 283-295 - Ghassan Z. Qadah, Lawrence J. Henschen, Jung J. Kim:

Efficient Algorithms for the Instantiated Transitive Closure Queries. 296-309 - Fevzi Belli, Piotr Jedrzejowicz:

An Approach to the Reliability Optimization of Software with Redundancy. 310-312
Volume 17, Number 4, April 1991
- Nozer D. Singpurwalla:

Determining an Optimal Time Interval for Testing and Debugging Software. 313-319 - Waleed A. Muhanna:

Composite Programs: Hierarchical Construction, Circularity, and Deadlocks. 320-333 - Karama Kanoun, Marta Rettelbusch de Bastos Martini, Jorge Moreira de Souza:

A Method for Software Reliability Analysis and Prediction Application to the TROPICO-R Switching System. 334-344 - Fatemeh Zahedi, Noushin Ashrafi:

Software Reliability Allocation Based on Structure, Utility, Price, and Cost. 345-356 - Alessandro Braccini, Alberto Del Bimbo

, Enrico Vicario
:
Interprocess Communication Dependency on Network Load. 357-369 - Jean-Claude Laprie, Karama Kanoun, Christian Béounes, Mohamed Kaâniche:

The KAT (Knowledge-Action-Transformation) Approach to the Modeling and Evaluation of Reliability and Availability Growth. 370-382 - Richard A. DeMillo, Richard J. Lipton:

Defining Software by Continuous, Smooth Functions. 383-384
Volume 17, Number 5, May 1991
- Alexander Thomasian, In Kyung Ryu:

Performance Analysis of Two-Phase Locking. 386-402 - Edward W. Krauser, Aditya P. Mathur, Vernon Rego:

High Performance Software Testing on SIMD Machines. 403-423 - Douglas E. Harms, Bruce W. Weide:

Copying and Swapping: Influences on the Design of Reusable Software Components. 424-435 - Boyan Dimitrov, Zohel Khalil, Nikolay Kolev

, Peter Petrov:
On the Optimal Total Processing Time Using Checkpoints. 436-442 - Dipak Ghosal

, Giuseppe Serazzi, Satish K. Tripathi:
The Processor Working Set and Its Use in Scheduling Multiprocessor Systems. 443-453 - Martin D. Fraser, Kuldeep Kumar, Vijay K. Vaishnavi:

Informal and Formal Requirements Specification Languages: Bridging the Gap. 454-466 - Udo Hahn, Matthias Jarke, Thomas Rose:

Teamwork Support in a Knowledge-Based Information Systems Environment. 467-482 - Yoshihiro Tohma, Hisashi Yamano, Morio Ohba, Raymond Jacoby:

The Estimation of Parameters of the Hypergeometric Distribution and Its Application to the Software Reliability Growth Model. 483-489
Volume 17, Number 6, June 1991
- Yoheved Dotan, Benjamin Arazi

:
Using Flat Concurrent Prolog in System Modeling. 493-512 - Fevzi Belli, Karl-Erwin Großpietsch:

Specification of Fault-Tolerant System Issues by Predicate/Transition Nets and Regular Expressions-Approach and Case Study. 513-526 - Stanley Lee, Suzanne Sluizer:

An Executable Language For Modeling Simple Behavior. 527-543 - Pai-Cheng Chu:

A Contingency Approach to Estimating Record Selectivities. 544-552 - Roy S. Freedman

:
Testability of Software Components. 553-564 - Allen S. Parrish, Stuart H. Zweben:

Analysis and Refinement of Software Test Data Adequacy Properties. 656-581 - Michiel van Genuchten:

Why is Software Late? An Empirical Study of Reasons For Delay in Software Development. 582-590 - Susumu Fujiwara, Gregor von Bochmann, Ferhat Khendek

, Mokhtar Amalou, Abderrazak Ghedamsi:
Test Selection Based on Finite State Models. 591-603 - Cheng Hsu, M'hamed Bouziane, Laurie Rattner, Lester Yee:

Information Resources Management in Heterogeneous, Distributed Environments: A Metadatabase Approach. 604-625 - John R. Callahan, James M. Purtilo:

A Packaging System For Heterogeneous Execution Environments. 626-635 - John C. Cherniavsky, Carl H. Smith:

On Weyuker's Axioms For Software Complexity Measures. 636-638
Volume 17, Number 7, July 1991
- John F. Beetem, Anne F. Beetem:

Incremental Scanning and Parsing With Galaxy. 641-651 - Zbigniew M. Wójcik, Barbara E. Wójcik:

Rough Grammar For Efficient and Fault-Tolerant Computing on a Distributed System. 652-668 - Terry Shepard, J. A. Martin Gagné:

A Pre-Run-Time Scheduling Algorithm For Hard Real-Time Systems. 669-677 - Witold Litwin, Nick Roussopoulos, Gérald Lévy, Wang Hong:

Trie Hashing With Controlled Load. 678-691 - Dave E. Eckhardt, Alper K. Caglayan, John C. Knight, Larry D. Lee, David F. McAllister, Mladen A. Vouk, John P. J. Kelly:

An Experimental Evaluation of Software Redundancy as a Strategy For Improving Reliability. 692-702 - Elaine J. Weyuker, Bingchiang Jeng:

Analyzing Partition Testing Strategies. 703-711 - Ugur Halici

, Asuman Dogac
:
An Optimistic Locking Technique For Concurrency Control in Distributed Databases. 712-724 - Thomas Kunz:

The Influence of Different Workload Descriptions on a Heuristic Load Balancing Scheme. 725-730 - Subhada K. Mishra, Vijay V. Raghavan, Nian-Feng Tzeng:

Efficient Algorithms For Selection of Recovery Points in Tree Task Models. 731-734
Volume 17, Number 8, August 1991
- Alexander D. Stoyenko, V. Carl Hamacher, Richard C. Holt:

Analyzing Hard-Real-Time Programs For Guaranteed Schedulability. 737-750 - Keith Brian Gallagher

, James R. Lyle:
Using Program Slicing in Software Maintenance. 751-761 - Timo Niemi, Kalervo Järvelin:

Prolog-Based Meta-Rules For Relational Database Representation and Manipulation. 762-788 - Ajay D. Kshemkalyani

, Mukesh Singhal:
Invariant-Based Verification of a Distributed Deadlock Detection Algorithm. 789-799 - Yoëlle S. Maarek, Daniel M. Berry, Gail E. Kaiser:

An Information Retrieval Approach For Automatically Constructing Software Libraries. 800-813 - Gilbert Babin, François Lustman, Peretz Shoval:

Specification and Design of Transactions in Information Systems: A Formal Approach. 814-829 - Takeshi Nakajo, Hitoshi Kume:

A Case History Analysis of Software Error Cause-Effect Relationships. 830-838 - Louis M. Taff, James W. Borchering, W. Richard Hudgins Jr.:

Estimeetings: Development Estimates and a Front-End Process For a Large Project. 839-849
Volume 17, Number 9, September 1991
- Fujio Nishida, Shinobu Takamatsu, Yoneharu Fujita, Tadaaki Tani:

Semi-Automatic Program Construction From Specifications Using Library Modules. 853-871 - Dong-Guk Shin, Keki B. Irani:

Fragmenting Relations Horizontally Using a Knowledge-Based Approach. 872-883 - Alberto Coen-Porisini

, Flavio De Paoli
, Carlo Ghezzi, Dino Mandrioli:
Software Specialization Via Symbolic Execution. 884-899 - Richard A. DeMillo, A. Jefferson Offutt:

Constraint-Based Automatic Test Data Generation. 900-910 - Mohamed G. Gouda, Ted Herman:

Adaptive Programming. 911-921 - C. Gary Rommel:

The Probability of Load Balancing Success in a Homogeneous Network. 922-933 - Daniel Hoffman, Paul A. Strooper

:
Automated Module Testing in Prolog. 934-943 - Ouri Wolfson

, Soumitra Sengupta, Yechiam Yemini:
Managing Communication Networks by Monitoring Databases. 944-953 - Yuri Breitbart, Dimitrios Georgakopoulos

, Marek Rusinkiewicz, Abraham Silberschatz:
On Rigorous Transaction Scheduling. 954-960 - Sergio Cárdenas-García, Marvin V. Zelkowitz:

A Management Tool For Evaluation of Software Designs. 961-971 - Michael D. Vose:

A Linear Algorithm For Generating Random Numbers With a Given Distribution. 972-975 - Sylvia C. Boyd, Hasan Ural:

On the Complexity of Generating Optimal Test Sequences. 976-978 - Goetz Graefe:

Heap-Filter Merge Join: A New Algorithm For Joining Medium-Size Inputs. 979-982
Volume 17, Number 10, October 1991
- Ishfaq Ahmad, Arif Ghafoor:

Semi-Distributed Load Balancing For Massively Parallel Multicomputer Systems. 987-1004 - Nihal Yazici-Pekergin, Jean-Marc Vincent:

Stochastic Bounds on Execution Times of Parallel Programs. 1005-1012 - Anurag Gupta, Ian F. Akyildiz, Richard Fujimoto:

Performance Analysis of Time Warp With Multiple Homogeneous Processors. 1013-1027 - Ivan P. Radivojevic, Jayantha A. Herath:

Executing DSP Applications in a Fine-Grained Dataflow Environment. 1028-1041 - Rajive L. Bagrodia, Chien-Chung Shen:

MIDAS: Integrated Design and Simulation of Distributed Systems. 1042-1058 - Xiaodong Zhang, Xiaohan Qin:

Performance Prediction and Evaluation of Parallel Processing on a NUMA Multiprocessor. 1059-1068 - János Sztrik, Demetres D. Kouvatsos:

Asymptotic Analysis of a Heterogeneous Multiprocessor System in a Randomly Changing Environment. 1069-1075 - Wesley W. Chu, Chi-Man Sit, Kin K. Leung:

Task Response Time For Real-Time Distributed Systems With Resource Contentions. 1076-1092 - Brigitte Plateau, Karim Atif:

Stochastic Automata Network For Modeling Parallel Systems. 1093-1108 - Gerald M. Karam, Raymond J. A. Buhr:

Temporal Logic-Based Deadlock Analysis For Ada. 1109-1125 - Kanth Miriyala, Mehdi T. Harandi:

Automatic Derivation of Formal Software Specifications From Informal Descriptions. 1126-1142
Volume 17, Number 11, November 1991
- Teresa F. Lunt, Deborah M. Cooper:

Introduction: Security and Privacy. 1145-1146 - Paul A. Karger, Mary Ellen Zurko, Douglas W. Bonin, Andrew H. Mason, Clifford E. Kahn:

A Retrospective on the VAX VMM Security Kernel. 1147-1165 - Richard A. Kemmerer, Phillip A. Porras:

Covert Flow Trees: A Visual Approach to Analyzing Covert Storage Channels. 1166-1185 - Jeremy Jacob:

A Uniform Presentation of Confidentiality Properties. 1186-1194 - Gary W. Smith:

Modeling Security-Relevant Data Semantics. 1195-1203 - George S. Avrunin, Ugo A. Buy, James C. Corbett, Laura K. Dillon, Jack C. Wileden:

Automated Analysis of Concurrent Systems With the Constrained Expression Toolset. 1204-1222
Volume 17, Number 12, December 1991
- Kar-Wing Edward Lor, Daniel M. Berry:

Automatic Synthesis of SARA Design Models From System Requirements. 1229-1240 - Jiawei Han, Ling Liu:

Efficient Evaluation of Multiple Linear Recursions. 1241-1252 - Julio César Sampaio do Prado Leite

, Peter A. Freeman:
Requirements Validation Through Viewpoint Resolution. 1253-1269 - Nazim H. Madhavji, Wilhelm Schäfer:

Prism-Methodology and Process-Oriented Environment. 1270-1283 - Geoffrey K. Gill, Chris F. Kemerer:

Cyclomatic Complexity Density and Software Maintenance Productivity. 1284-1288 - K. B. Lakshmanan, S. Jayaprakash, P. K. Sinha:

Properties of Control-Flow Complexity Measures. 1289-1295

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














