Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/sigsoft/sigsoft10.bht:"
@article{DBLP:journals/sigsoft/0002A85, author = {James G. Williams and Charles H. Applebaum}, title = {The Practical Verification System Project}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {4}, pages = {44--47}, year = {1985}, url = {https://doi.org/10.1145/1012497.1012512}, doi = {10.1145/1012497.1012512}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/0002A85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/AbdaliL85, author = {S. Kamal Abdali and Ralph L. London}, title = {Exploiting workstations and displays in verification systems}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {4}, pages = {35--36}, year = {1985}, url = {https://doi.org/10.1145/1012497.1012509}, doi = {10.1145/1012497.1012509}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/AbdaliL85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/Aggarwal85, author = {Rajeev Aggarwal}, title = {Management of dormant files}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {5}, pages = {60--61}, year = {1985}, url = {https://doi.org/10.1145/382288.382768}, doi = {10.1145/382288.382768}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/Aggarwal85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/Bazelmans85, author = {Rudy Bazelmans}, title = {Productivity: the role of the tools group}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {3}, pages = {63--75}, year = {1985}, url = {https://doi.org/10.1145/1012483.1012492}, doi = {10.1145/1012483.1012492}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/Bazelmans85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/Bazelmans85a, author = {Rudy Bazelmans}, title = {Evolution of configuration management}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {5}, pages = {37--46}, year = {1985}, url = {https://doi.org/10.1145/382288.382769}, doi = {10.1145/382288.382769}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/Bazelmans85a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/BeladyR85, author = {Les Belady and Charles Richter}, title = {The {MCC} software technology program}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {3}, pages = {33--36}, year = {1985}, url = {https://doi.org/10.1145/1012483.1012486}, doi = {10.1145/1012483.1012486}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/BeladyR85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/Benzel85, author = {Terry C. Vickers Benzel}, title = {Verification technology and the {A1} criteria}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {4}, pages = {108--109}, year = {1985}, url = {https://doi.org/10.1145/1012497.1012543}, doi = {10.1145/1012497.1012543}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/Benzel85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/Berry85, author = {Daniel M. Berry}, title = {An Ina Jo{\textregistered} proof manager for the formal development method}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {4}, pages = {19--25}, year = {1985}, url = {https://doi.org/10.1145/1012497.1012505}, doi = {10.1145/1012497.1012505}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/Berry85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/Blum85, author = {Bruce I. Blum}, title = {Understanding the software paradox}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {1}, pages = {43--46}, year = {1985}, url = {https://doi.org/10.1145/1012443.1012447}, doi = {10.1145/1012443.1012447}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/Blum85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/BoebertK85, author = {William Earl Boebert and Richard Y. Kain}, title = {The extended access matrix model of computer security}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {4}, pages = {119--125}, year = {1985}, url = {https://doi.org/10.1145/1012497.1012548}, doi = {10.1145/1012497.1012548}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigsoft/BoebertK85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/BoyerK85, author = {Robert S. Boyer and Matt Kaufmann}, title = {A prototype theorem-prover for a higher-order functional language}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {4}, pages = {72--74}, year = {1985}, url = {https://doi.org/10.1145/1012497.1012525}, doi = {10.1145/1012497.1012525}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/BoyerK85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/BranstadT85, author = {Martha A. Branstad and Leonard L. Tripp}, title = {Summary of {SESAW} {III}}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {5}, pages = {33--36}, year = {1985}, url = {https://doi.org/10.1145/382288.382767}, doi = {10.1145/382288.382767}, timestamp = {Mon, 21 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/BranstadT85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/Cooper85, author = {D. Cooper}, title = {Overview of Theorem Proving}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {4}, pages = {53--54}, year = {1985}, url = {https://doi.org/10.1145/1012497.1012517}, doi = {10.1145/1012497.1012517}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/Cooper85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/Craigen85, author = {Dan Craigen}, title = {Some thoughts arising from a language design effort}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {4}, pages = {80--81}, year = {1985}, url = {https://doi.org/10.1145/1012497.1012529}, doi = {10.1145/1012497.1012529}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/Craigen85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/CraigenG85, author = {Dan Craigen and Donald I. Good}, title = {Overview of verification systems}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {4}, pages = {1}, year = {1985}, url = {https://doi.org/10.1145/1012497.1012499}, doi = {10.1145/1012497.1012499}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/CraigenG85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/CraigenS85, author = {Dan Craigen and Mark Saaltink}, title = {An {EVES} update}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {4}, pages = {33--34}, year = {1985}, url = {https://doi.org/10.1145/1012497.1012508}, doi = {10.1145/1012497.1012508}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/CraigenS85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/Crocker85, author = {Stephen D. Crocker}, title = {Engineering requirements for production quality verification systems}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {4}, pages = {15--16}, year = {1985}, url = {https://doi.org/10.1145/1012497.1012503}, doi = {10.1145/1012497.1012503}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigsoft/Crocker85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/DahlO85, author = {Ole{-}Johan Dahl and Olaf Owe}, title = {A presentation of the specification and verification project "ABEL"}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {4}, pages = {28--32}, year = {1985}, url = {https://doi.org/10.1145/1012497.1012507}, doi = {10.1145/1012497.1012507}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigsoft/DahlO85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/Davis85, author = {Daniel Davis}, title = {Resource abstraction and validation}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {4}, pages = {110}, year = {1985}, url = {https://doi.org/10.1145/1012497.1012544}, doi = {10.1145/1012497.1012544}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/Davis85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/Dershowitz85, author = {Nachum Dershowitz}, title = {Rewriting and verification}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {4}, pages = {60}, year = {1985}, url = {https://doi.org/10.1145/1012497.1012519}, doi = {10.1145/1012497.1012519}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/Dershowitz85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/DershowitzP85, author = {Nachum Dershowitz and David A. Plaisted}, title = {Conditional rewriting}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {4}, pages = {55--59}, year = {1985}, url = {https://doi.org/10.1145/1012497.1012518}, doi = {10.1145/1012497.1012518}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/DershowitzP85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/Dunn85, author = {Dick Dunn}, title = {The emerging social significance of the magnetic-tape write-enable ring}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {2}, pages = {47--50}, year = {1985}, url = {https://doi.org/10.1145/1012621.1012630}, doi = {10.1145/1012621.1012630}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/Dunn85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/EckmannK85, author = {Steven T. Eckmann and Richard A. Kemmerer}, title = {{INATEST:} an interactive environment for testing formal specifications}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {4}, pages = {17--18}, year = {1985}, url = {https://doi.org/10.1145/1012497.1012504}, doi = {10.1145/1012497.1012504}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/EckmannK85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/Foster85, author = {Kenneth A. Foster}, title = {Revision of an error sensitive test rule}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {1}, pages = {62--67}, year = {1985}, url = {https://doi.org/10.1145/1012443.1012451}, doi = {10.1145/1012443.1012451}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/Foster85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/Garg85, author = {Vijay Kumar Garg}, title = {Functional composition: a mechanism to compose programs}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {3}, pages = {37--39}, year = {1985}, url = {https://doi.org/10.1145/1012483.1012487}, doi = {10.1145/1012483.1012487}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/Garg85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/Geller85, author = {Dennis P. Geller}, title = {B-ware: contradictions in a software development plan}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {1}, pages = {48--51}, year = {1985}, url = {https://doi.org/10.1145/1012443.1012448}, doi = {10.1145/1012443.1012448}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/Geller85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/Gerhart85, author = {Susan L. Gerhart}, title = {Prolog technology as a basis for verification systems}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {4}, pages = {37--40}, year = {1985}, url = {https://doi.org/10.1145/1012497.1012510}, doi = {10.1145/1012497.1012510}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/Gerhart85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/Gilb85, author = {Tom Gilb}, title = {Evolutionary Delivery versus the "waterfall model"}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {3}, pages = {49--61}, year = {1985}, url = {https://doi.org/10.1145/1012483.1012490}, doi = {10.1145/1012483.1012490}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/Gilb85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/GlasgowM85, author = {Janice I. Glasgow and Glenn H. MacEwen}, title = {{LUCID:} a specification language for distributed systems}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {4}, pages = {76--79}, year = {1985}, url = {https://doi.org/10.1145/1012497.1012528}, doi = {10.1145/1012497.1012528}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/GlasgowM85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/GoodBM85, author = {Donald I. Good and Robert S. Boyer and J Strother Moore}, title = {A second generation verification environment}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {4}, pages = {48}, year = {1985}, url = {https://doi.org/10.1145/1012497.1012513}, doi = {10.1145/1012497.1012513}, timestamp = {Mon, 19 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigsoft/GoodBM85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/Harbaugh85, author = {Sam Harbaugh}, title = {Beware of beware}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {2}, pages = {46}, year = {1985}, url = {https://doi.org/10.1145/1012621.1012629}, doi = {10.1145/1012621.1012629}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/Harbaugh85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/Henderson85, author = {Peter B. Henderson}, title = {Software development/programming environments}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {2}, pages = {60--62}, year = {1985}, url = {https://doi.org/10.1145/1012621.1012633}, doi = {10.1145/1012621.1012633}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/Henderson85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/Henke85, author = {Friedrich W. von Henke}, title = {Reasoning with Hoare sentences}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {4}, pages = {84}, year = {1985}, url = {https://doi.org/10.1145/1012497.1012531}, doi = {10.1145/1012497.1012531}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/Henke85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/HeymanL85, author = {Jerrold Heyman and William M. Lively}, title = {Syntax-directed editing revisited}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {3}, pages = {24--27}, year = {1985}, url = {https://doi.org/10.1145/1012483.1012484}, doi = {10.1145/1012483.1012484}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/HeymanL85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/Hookway85, author = {Raymond J. Hookway}, title = {Verifying Ada programs}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {4}, pages = {51--52}, year = {1985}, url = {https://doi.org/10.1145/1012497.1012515}, doi = {10.1145/1012497.1012515}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/Hookway85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/Horning85, author = {Jim Horning}, title = {Computing in support of battle management}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {5}, pages = {24--27}, year = {1985}, url = {https://doi.org/10.1145/382288.382761}, doi = {10.1145/382288.382761}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/Horning85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/KapurN85, author = {Deepak Kapur and Paliath Narendran}, title = {An equational approach to theorem proving in first-order predicate calculus}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {4}, pages = {63--66}, year = {1985}, url = {https://doi.org/10.1145/1012497.1012521}, doi = {10.1145/1012497.1012521}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/KapurN85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/KapurS85, author = {Deepak Kapur and G. Sivakumar}, title = {{RRL:} theorem proving environment based on rewriting techniques}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {4}, pages = {67--68}, year = {1985}, url = {https://doi.org/10.1145/1012497.1012522}, doi = {10.1145/1012497.1012522}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/KapurS85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/Kemmerer85, author = {Richard A. Kemmerer}, title = {Overview of foundations}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {4}, pages = {75}, year = {1985}, url = {https://doi.org/10.1145/1012497.1012527}, doi = {10.1145/1012497.1012527}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/Kemmerer85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/Lamb85, author = {Rebecca Ann Lamb}, title = {More on software quality assurance}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {2}, pages = {45}, year = {1985}, url = {https://doi.org/10.1145/1012621.1012628}, doi = {10.1145/1012621.1012628}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigsoft/Lamb85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/Landwehr85, author = {Carl E. Landwehr}, title = {Does program verification help?: how much?}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {4}, pages = {107}, year = {1985}, url = {https://doi.org/10.1145/1012497.1012542}, doi = {10.1145/1012497.1012542}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/Landwehr85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/Landwehr85a, author = {Carl E. Landwehr}, title = {Some lessons from formalizing a security model}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {4}, pages = {111--112}, year = {1985}, url = {https://doi.org/10.1145/1012497.1012545}, doi = {10.1145/1012497.1012545}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigsoft/Landwehr85a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/Lawrence85, author = {J. L. Lawrence}, title = {Why is software always late?}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {1}, pages = {19--30}, year = {1985}, url = {https://doi.org/10.1145/1012443.1012445}, doi = {10.1145/1012443.1012445}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/Lawrence85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/Lawrence85a, author = {J. L. Lawrence}, title = {The {RC2000:} a software success story}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {1}, pages = {31--42}, year = {1985}, url = {https://doi.org/10.1145/1012443.1012446}, doi = {10.1145/1012443.1012446}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/Lawrence85a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/Lee85, author = {Kyu Y. Lee}, title = {Response to Jim Horning's letter}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {5}, pages = {30}, year = {1985}, url = {https://doi.org/10.1145/382288.382765}, doi = {10.1145/382288.382765}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/Lee85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/LevittW85, author = {Karl N. Levitt and R. Alan Whitehurst}, title = {Overview of applications}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {4}, pages = {95--96}, year = {1985}, url = {https://doi.org/10.1145/1012497.1012537}, doi = {10.1145/1012497.1012537}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/LevittW85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/Loy85, author = {Patrick H. Loy}, title = {System partitioning: a critical and often belittled development phase}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {2}, pages = {41--44}, year = {1985}, url = {https://doi.org/10.1145/1012621.1012627}, doi = {10.1145/1012621.1012627}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/Loy85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/Macdonald85, author = {Ruaridh Macdonald}, title = {Verifying a real system design: some of the problems}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {4}, pages = {126--129}, year = {1985}, url = {https://doi.org/10.1145/1012497.1012549}, doi = {10.1145/1012497.1012549}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/Macdonald85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/MarcusCL85, author = {Leo Marcus and Stephen D. Crocker and Jaisook Landauer}, title = {{SDVS:} a system for verifying microcode correctness}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {4}, pages = {7--14}, year = {1985}, url = {https://doi.org/10.1145/1012497.1012502}, doi = {10.1145/1012497.1012502}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/MarcusCL85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/Mastro85, author = {Vincent A. Mastro}, title = {Three dimensional system development}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {5}, pages = {47--59}, year = {1985}, url = {https://doi.org/10.1145/382288.382770}, doi = {10.1145/382288.382770}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/Mastro85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/MaurerB85, author = {W. D. Maurer and Tim E. Barrios}, title = {The parable of the two programmers, continued}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {2}, pages = {19--22}, year = {1985}, url = {https://doi.org/10.1145/1012621.1012623}, doi = {10.1145/1012621.1012623}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigsoft/MaurerB85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/McHughN85, author = {John McHugh and Karl A. Nyberg}, title = {Ada verification using existing tools}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {4}, pages = {104--106}, year = {1985}, url = {https://doi.org/10.1145/1012497.1012541}, doi = {10.1145/1012497.1012541}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigsoft/McHughN85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/McLean85, author = {John McLean}, title = {Two dogmas of program specification}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {4}, pages = {85--87}, year = {1985}, url = {https://doi.org/10.1145/1012497.1012532}, doi = {10.1145/1012497.1012532}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/McLean85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/Melliar-SmithR85, author = {P. Michael Melliar{-}Smith and John Rushby}, title = {The enhanced {HDM} system for specification and verification}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {4}, pages = {41--43}, year = {1985}, url = {https://doi.org/10.1145/1012497.1012511}, doi = {10.1145/1012497.1012511}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/Melliar-SmithR85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/Miya85, author = {Eugene N. Miya}, title = {On "Software engineering"}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {1}, pages = {12}, year = {1985}, url = {https://doi.org/10.1145/1012443.1012444}, doi = {10.1145/1012443.1012444}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/Miya85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/Moore85, author = {Martin J. Moore}, title = {Software engineering and {SDI}}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {5}, pages = {28}, year = {1985}, url = {https://doi.org/10.1145/382288.382762}, doi = {10.1145/382288.382762}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/Moore85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/Musser85, author = {David R. Musser}, title = {{AIDS} to hierarchical specification structuring and reusing theorems in {AFFIRM-85}}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {4}, pages = {2--4}, year = {1985}, url = {https://doi.org/10.1145/1012497.1012500}, doi = {10.1145/1012497.1012500}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/Musser85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/Nelson85, author = {David A. Nelson}, title = {Will the real {SE} metaphors please stand up!: (or, {I} never metaphor {I} didn't like!)}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {5}, pages = {31--32}, year = {1985}, url = {https://doi.org/10.1145/382288.382766}, doi = {10.1145/382288.382766}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/Nelson85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/Neumann85, author = {Peter G. Neumann}, title = {Review of "The Sachertorte algorithm and other antidotes to computer anxiety" by John Shore. Viking 1985}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {2}, pages = {23--27}, year = {1985}, url = {https://doi.org/10.1145/1012621.1012624}, doi = {10.1145/1012621.1012624}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/Neumann85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/Olenfeldt85, author = {Lars Olenfeldt}, title = {A very short paper on the {OBJECT/EVENT-ANALYSIS}}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {1}, pages = {52--57}, year = {1985}, url = {https://doi.org/10.1145/1012443.1012449}, doi = {10.1145/1012443.1012449}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/Olenfeldt85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/Owre85, author = {Sam Owre}, title = {The Sytek theorem prover}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {4}, pages = {69}, year = {1985}, url = {https://doi.org/10.1145/1012497.1012523}, doi = {10.1145/1012497.1012523}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/Owre85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/Parikh85, author = {Girish Parikh}, title = {Software maintenance news}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {2}, pages = {58--59}, year = {1985}, url = {https://doi.org/10.1145/1012621.1012632}, doi = {10.1145/1012621.1012632}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/Parikh85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/Parikh85a, author = {Girish Parikh}, title = {Discovering the world of software maintenance: selected readings}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {5}, pages = {79--88}, year = {1985}, url = {https://doi.org/10.1145/382288.382775}, doi = {10.1145/382288.382775}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/Parikh85a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/Parikh85b, author = {Girish Parikh}, title = {Software maintenance: penny wise, program foolish}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {5}, pages = {89--98}, year = {1985}, url = {https://doi.org/10.1145/382288.382774}, doi = {10.1145/382288.382774}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/Parikh85b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/Parker85, author = {Jeff Parker}, title = {Towards more intelligent programming environments}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {3}, pages = {28--32}, year = {1985}, url = {https://doi.org/10.1145/1012483.1012485}, doi = {10.1145/1012483.1012485}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/Parker85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/Parnas85, author = {David Lorge Parnas}, title = {Software aspects of strategic defense systems}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {5}, pages = {15--23}, year = {1985}, url = {https://doi.org/10.1145/382288.382289}, doi = {10.1145/382288.382289}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/Parnas85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/PenteadoMG85, author = {Ros{\^{a}}ngela Dellosso Penteado and Paulo C{\'{e}}sar Masiero and Fern{\~{a}}o Stella R. Germano}, title = {Structure charts for Jackson system development}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {3}, pages = {40--46}, year = {1985}, url = {https://doi.org/10.1145/1012483.1012488}, doi = {10.1145/1012483.1012488}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/PenteadoMG85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/Pixon85, author = {Mark R. Pixon}, title = {Enhancing {FDM} for the expression of concurrency requirements}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {4}, pages = {92--94}, year = {1985}, url = {https://doi.org/10.1145/1012497.1012535}, doi = {10.1145/1012497.1012535}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/Pixon85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/Proctor85, author = {Norman Proctor}, title = {The restricted access processor: an example of formal verification}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {4}, pages = {116--118}, year = {1985}, url = {https://doi.org/10.1145/1012497.1012547}, doi = {10.1145/1012497.1012547}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/Proctor85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/Putnam85, author = {Dan Putnam}, title = {The VERUS{\texttrademark} design verification system}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {4}, pages = {26--27}, year = {1985}, url = {https://doi.org/10.1145/1012497.1012506}, doi = {10.1145/1012497.1012506}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/Putnam85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/Putnam85a, author = {Dan Putnam}, title = {Separating methodology and specification constructs}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {4}, pages = {90--91}, year = {1985}, url = {https://doi.org/10.1145/1012497.1012534}, doi = {10.1145/1012497.1012534}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/Putnam85a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/RamanathanR85, author = {Jayashree Ramanathan and John M. Rose}, title = {{TRIAD:} beyond isolated systems for development-in-the-large and programming-in-the-small}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {5}, pages = {62--72}, year = {1985}, url = {https://doi.org/10.1145/382288.382772}, doi = {10.1145/382288.382772}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/RamanathanR85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/RamanathanVAR85, author = {Jayashree Ramanathan and Robert Vermilyer and Thorbjorn Anderson and John M. Rose}, title = {The use of a relational data base in method driven environments}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {5}, pages = {73--78}, year = {1985}, url = {https://doi.org/10.1145/382288.382773}, doi = {10.1145/382288.382773}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigsoft/RamanathanVAR85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/Reifer85, author = {Donald J. Reifer}, title = {Review of "Principles of productive software management" by Michael W. Evans, Pamela Piazza, and James B. Dolkes. John Wiley {\&} Sons 1983}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {1}, pages = {58}, year = {1985}, url = {https://doi.org/10.1145/1012443.1012450}, doi = {10.1145/1012443.1012450}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/Reifer85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/Reynolds85, author = {Robert G. Reynolds}, title = {{PARTIAL:} a tool to monitor the stepwise refinement of Ada programs}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {3}, pages = {76--94}, year = {1985}, url = {https://doi.org/10.1145/1012483.1012493}, doi = {10.1145/1012483.1012493}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/Reynolds85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/Rickert85, author = {Neil W. Rickert}, title = {A system for managing shared files}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {2}, pages = {35--40}, year = {1985}, url = {https://doi.org/10.1145/1012621.1012626}, doi = {10.1145/1012621.1012626}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/Rickert85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/Saaltink85, author = {Mark Saaltink}, title = {Relational semantics}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {4}, pages = {82--83}, year = {1985}, url = {https://doi.org/10.1145/1012497.1012530}, doi = {10.1145/1012497.1012530}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/Saaltink85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/Schultz85, author = {David J. Schultz}, title = {Standard for the software life-cycle process}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {3}, pages = {62}, year = {1985}, url = {https://doi.org/10.1145/1012483.1012491}, doi = {10.1145/1012483.1012491}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/Schultz85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/Schwartz85, author = {David P. Schwartz}, title = {Summary of {IEEE} {CSM} {WG} meeting {\#}5, 23-25 Jan 85}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {2}, pages = {51--57}, year = {1985}, url = {https://doi.org/10.1145/1012621.1012631}, doi = {10.1145/1012621.1012631}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/Schwartz85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/Smith85, author = {Brian T. Smith}, title = {Position paper to be presented at "Verification workshop {III} (verkshop III)" to be held in Watsonville, {CA.} Feb. 18-21, 1985}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {4}, pages = {61--62}, year = {1985}, url = {https://doi.org/10.1145/1012497.1012520}, doi = {10.1145/1012497.1012520}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/Smith85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/SmithC85, author = {Michael K. Smith and Richard M. Cohen}, title = {Gypsy verification environment: status}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {4}, pages = {5--6}, year = {1985}, url = {https://doi.org/10.1145/1012497.1012501}, doi = {10.1145/1012497.1012501}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/SmithC85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/SpinradA85, author = {Mark D. Spinrad and Curt Abraham}, title = {The Wild-West Lifecycle {(WILI)}}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {3}, pages = {47--48}, year = {1985}, url = {https://doi.org/10.1145/1012483.1012489}, doi = {10.1145/1012483.1012489}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/SpinradA85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/Stokes85, author = {R. Stokes}, title = {Some formal method activities in {UK} industry}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {4}, pages = {129--130}, year = {1985}, url = {https://doi.org/10.1145/1012497.1012550}, doi = {10.1145/1012497.1012550}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/Stokes85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/TateD85, author = {Graham Tate and Thomas W. G. Docker}, title = {A rapid prototyping system based on data flow principles}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {2}, pages = {28--34}, year = {1985}, url = {https://doi.org/10.1145/1012621.1012625}, doi = {10.1145/1012621.1012625}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigsoft/TateD85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/Taylor85, author = {Tad Taylor}, title = {Verkshop position paper}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {4}, pages = {113--116}, year = {1985}, url = {https://doi.org/10.1145/1012497.1012546}, doi = {10.1145/1012497.1012546}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/Taylor85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/Vito85, author = {Ben Di Vito}, title = {Towards a definition of "Beyond AI" verification}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {4}, pages = {101--102}, year = {1985}, url = {https://doi.org/10.1145/1012497.1012539}, doi = {10.1145/1012497.1012539}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/Vito85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/Ward85, author = {Jean Renard Ward}, title = {{UNIX} as an environment for non-UNIX software development: a case history}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {3}, pages = {95--108}, year = {1985}, url = {https://doi.org/10.1145/1012483.1012494}, doi = {10.1145/1012483.1012494}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/Ward85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/Weiss85, author = {David Weiss}, title = {Strategic defense initiative software feasibility (panel): panel discussion at the 8th {ICSE}}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {5}, pages = {29}, year = {1985}, url = {https://doi.org/10.1145/382288.382763}, doi = {10.1145/382288.382763}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/Weiss85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/Whitehurst85, author = {R. Alan Whitehurst}, title = {The need for an integrated design, implementation, verification and testing methodology}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {4}, pages = {97--100}, year = {1985}, url = {https://doi.org/10.1145/1012497.1012538}, doi = {10.1145/1012497.1012538}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/Whitehurst85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/Williams85, author = {James G. Williams}, title = {Components of verification technology}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {4}, pages = {49--50}, year = {1985}, url = {https://doi.org/10.1145/1012497.1012514}, doi = {10.1145/1012497.1012514}, timestamp = {Thu, 17 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/Williams85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/WilsonO85, author = {William F. Wilson and Sam Owre}, title = {Programmable heuristics for theorem provers}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {4}, pages = {70--71}, year = {1985}, url = {https://doi.org/10.1145/1012497.1012524}, doi = {10.1145/1012497.1012524}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/WilsonO85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/Wing85, author = {Jeannette M. Wing}, title = {Beyond functional behavior: combining methods to specify different classes of properties of large systems}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {4}, pages = {102--104}, year = {1985}, url = {https://doi.org/10.1145/1012497.1012540}, doi = {10.1145/1012497.1012540}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/Wing85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/X85, title = {Abstracts in software engineering}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {1}, pages = {74--81}, year = {1985}, url = {https://doi.org/10.1145/1012443.1012452}, doi = {10.1145/1012443.1012452}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/X85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/X85a, title = {Questionnaire responses}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {2}, pages = {12--15}, year = {1985}, url = {https://doi.org/10.1145/1012621.1012622}, doi = {10.1145/1012621.1012622}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/X85a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/X85b, title = {Proceedings of the {ACM} Ada {TEC} "Future Ada environment workshop"}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {2}, pages = {77--117}, year = {1985}, url = {https://doi.org/10.1145/1012621.1012634}, doi = {10.1145/1012621.1012634}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/X85b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/X85c, title = {Abstracts in software engineering}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {2}, pages = {118--125}, year = {1985}, url = {https://doi.org/10.1145/1012621.1012635}, doi = {10.1145/1012621.1012635}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/X85c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/X85d, title = {Abstracts in software engineering}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {3}, pages = {109--117}, year = {1985}, url = {https://doi.org/10.1145/1012483.1012495}, doi = {10.1145/1012483.1012495}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/X85d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/X85e, title = {Old-fashioned logic for verification}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {10}, number = {4}, pages = {87--89}, year = {1985}, url = {https://doi.org/10.1145/1012497.1012533}, doi = {10.1145/1012497.1012533}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigsoft/X85e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.