Search dblp for Publications

export results for "toc:db/journals/sigsoft/sigsoft10.bht:"

 download as .bib file

@article{DBLP:journals/sigsoft/0002A85,
  author       = {James G. Williams and
                  Charles H. Applebaum},
  title        = {The Practical Verification System Project},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {4},
  pages        = {44--47},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012497.1012512},
  doi          = {10.1145/1012497.1012512},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/0002A85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/AbdaliL85,
  author       = {S. Kamal Abdali and
                  Ralph L. London},
  title        = {Exploiting workstations and displays in verification systems},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {4},
  pages        = {35--36},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012497.1012509},
  doi          = {10.1145/1012497.1012509},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/AbdaliL85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/Aggarwal85,
  author       = {Rajeev Aggarwal},
  title        = {Management of dormant files},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {5},
  pages        = {60--61},
  year         = {1985},
  url          = {https://doi.org/10.1145/382288.382768},
  doi          = {10.1145/382288.382768},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/Aggarwal85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/Bazelmans85,
  author       = {Rudy Bazelmans},
  title        = {Productivity: the role of the tools group},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {3},
  pages        = {63--75},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012483.1012492},
  doi          = {10.1145/1012483.1012492},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/Bazelmans85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/Bazelmans85a,
  author       = {Rudy Bazelmans},
  title        = {Evolution of configuration management},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {5},
  pages        = {37--46},
  year         = {1985},
  url          = {https://doi.org/10.1145/382288.382769},
  doi          = {10.1145/382288.382769},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/Bazelmans85a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/BeladyR85,
  author       = {Les Belady and
                  Charles Richter},
  title        = {The {MCC} software technology program},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {3},
  pages        = {33--36},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012483.1012486},
  doi          = {10.1145/1012483.1012486},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/BeladyR85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/Benzel85,
  author       = {Terry C. Vickers Benzel},
  title        = {Verification technology and the {A1} criteria},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {4},
  pages        = {108--109},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012497.1012543},
  doi          = {10.1145/1012497.1012543},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/Benzel85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/Berry85,
  author       = {Daniel M. Berry},
  title        = {An Ina Jo{\textregistered} proof manager for the formal development
                  method},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {4},
  pages        = {19--25},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012497.1012505},
  doi          = {10.1145/1012497.1012505},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/Berry85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/Blum85,
  author       = {Bruce I. Blum},
  title        = {Understanding the software paradox},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {1},
  pages        = {43--46},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012443.1012447},
  doi          = {10.1145/1012443.1012447},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/Blum85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/BoebertK85,
  author       = {William Earl Boebert and
                  Richard Y. Kain},
  title        = {The extended access matrix model of computer security},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {4},
  pages        = {119--125},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012497.1012548},
  doi          = {10.1145/1012497.1012548},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigsoft/BoebertK85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/BoyerK85,
  author       = {Robert S. Boyer and
                  Matt Kaufmann},
  title        = {A prototype theorem-prover for a higher-order functional language},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {4},
  pages        = {72--74},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012497.1012525},
  doi          = {10.1145/1012497.1012525},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/BoyerK85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/BranstadT85,
  author       = {Martha A. Branstad and
                  Leonard L. Tripp},
  title        = {Summary of {SESAW} {III}},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {5},
  pages        = {33--36},
  year         = {1985},
  url          = {https://doi.org/10.1145/382288.382767},
  doi          = {10.1145/382288.382767},
  timestamp    = {Mon, 21 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/BranstadT85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/Cooper85,
  author       = {D. Cooper},
  title        = {Overview of Theorem Proving},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {4},
  pages        = {53--54},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012497.1012517},
  doi          = {10.1145/1012497.1012517},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/Cooper85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/Craigen85,
  author       = {Dan Craigen},
  title        = {Some thoughts arising from a language design effort},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {4},
  pages        = {80--81},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012497.1012529},
  doi          = {10.1145/1012497.1012529},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/Craigen85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/CraigenG85,
  author       = {Dan Craigen and
                  Donald I. Good},
  title        = {Overview of verification systems},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {4},
  pages        = {1},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012497.1012499},
  doi          = {10.1145/1012497.1012499},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/CraigenG85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/CraigenS85,
  author       = {Dan Craigen and
                  Mark Saaltink},
  title        = {An {EVES} update},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {4},
  pages        = {33--34},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012497.1012508},
  doi          = {10.1145/1012497.1012508},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/CraigenS85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/Crocker85,
  author       = {Stephen D. Crocker},
  title        = {Engineering requirements for production quality verification systems},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {4},
  pages        = {15--16},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012497.1012503},
  doi          = {10.1145/1012497.1012503},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigsoft/Crocker85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/DahlO85,
  author       = {Ole{-}Johan Dahl and
                  Olaf Owe},
  title        = {A presentation of the specification and verification project "ABEL"},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {4},
  pages        = {28--32},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012497.1012507},
  doi          = {10.1145/1012497.1012507},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigsoft/DahlO85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/Davis85,
  author       = {Daniel Davis},
  title        = {Resource abstraction and validation},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {4},
  pages        = {110},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012497.1012544},
  doi          = {10.1145/1012497.1012544},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/Davis85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/Dershowitz85,
  author       = {Nachum Dershowitz},
  title        = {Rewriting and verification},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {4},
  pages        = {60},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012497.1012519},
  doi          = {10.1145/1012497.1012519},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/Dershowitz85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/DershowitzP85,
  author       = {Nachum Dershowitz and
                  David A. Plaisted},
  title        = {Conditional rewriting},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {4},
  pages        = {55--59},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012497.1012518},
  doi          = {10.1145/1012497.1012518},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/DershowitzP85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/Dunn85,
  author       = {Dick Dunn},
  title        = {The emerging social significance of the magnetic-tape write-enable
                  ring},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {2},
  pages        = {47--50},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012621.1012630},
  doi          = {10.1145/1012621.1012630},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/Dunn85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/EckmannK85,
  author       = {Steven T. Eckmann and
                  Richard A. Kemmerer},
  title        = {{INATEST:} an interactive environment for testing formal specifications},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {4},
  pages        = {17--18},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012497.1012504},
  doi          = {10.1145/1012497.1012504},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/EckmannK85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/Foster85,
  author       = {Kenneth A. Foster},
  title        = {Revision of an error sensitive test rule},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {1},
  pages        = {62--67},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012443.1012451},
  doi          = {10.1145/1012443.1012451},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/Foster85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/Garg85,
  author       = {Vijay Kumar Garg},
  title        = {Functional composition: a mechanism to compose programs},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {3},
  pages        = {37--39},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012483.1012487},
  doi          = {10.1145/1012483.1012487},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/Garg85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/Geller85,
  author       = {Dennis P. Geller},
  title        = {B-ware: contradictions in a software development plan},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {1},
  pages        = {48--51},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012443.1012448},
  doi          = {10.1145/1012443.1012448},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/Geller85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/Gerhart85,
  author       = {Susan L. Gerhart},
  title        = {Prolog technology as a basis for verification systems},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {4},
  pages        = {37--40},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012497.1012510},
  doi          = {10.1145/1012497.1012510},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/Gerhart85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/Gilb85,
  author       = {Tom Gilb},
  title        = {Evolutionary Delivery versus the "waterfall model"},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {3},
  pages        = {49--61},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012483.1012490},
  doi          = {10.1145/1012483.1012490},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/Gilb85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/GlasgowM85,
  author       = {Janice I. Glasgow and
                  Glenn H. MacEwen},
  title        = {{LUCID:} a specification language for distributed systems},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {4},
  pages        = {76--79},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012497.1012528},
  doi          = {10.1145/1012497.1012528},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/GlasgowM85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/GoodBM85,
  author       = {Donald I. Good and
                  Robert S. Boyer and
                  J Strother Moore},
  title        = {A second generation verification environment},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {4},
  pages        = {48},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012497.1012513},
  doi          = {10.1145/1012497.1012513},
  timestamp    = {Mon, 19 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigsoft/GoodBM85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/Harbaugh85,
  author       = {Sam Harbaugh},
  title        = {Beware of beware},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {2},
  pages        = {46},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012621.1012629},
  doi          = {10.1145/1012621.1012629},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/Harbaugh85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/Henderson85,
  author       = {Peter B. Henderson},
  title        = {Software development/programming environments},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {2},
  pages        = {60--62},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012621.1012633},
  doi          = {10.1145/1012621.1012633},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/Henderson85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/Henke85,
  author       = {Friedrich W. von Henke},
  title        = {Reasoning with Hoare sentences},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {4},
  pages        = {84},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012497.1012531},
  doi          = {10.1145/1012497.1012531},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/Henke85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/HeymanL85,
  author       = {Jerrold Heyman and
                  William M. Lively},
  title        = {Syntax-directed editing revisited},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {3},
  pages        = {24--27},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012483.1012484},
  doi          = {10.1145/1012483.1012484},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/HeymanL85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/Hookway85,
  author       = {Raymond J. Hookway},
  title        = {Verifying Ada programs},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {4},
  pages        = {51--52},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012497.1012515},
  doi          = {10.1145/1012497.1012515},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/Hookway85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/Horning85,
  author       = {Jim Horning},
  title        = {Computing in support of battle management},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {5},
  pages        = {24--27},
  year         = {1985},
  url          = {https://doi.org/10.1145/382288.382761},
  doi          = {10.1145/382288.382761},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/Horning85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/KapurN85,
  author       = {Deepak Kapur and
                  Paliath Narendran},
  title        = {An equational approach to theorem proving in first-order predicate
                  calculus},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {4},
  pages        = {63--66},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012497.1012521},
  doi          = {10.1145/1012497.1012521},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/KapurN85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/KapurS85,
  author       = {Deepak Kapur and
                  G. Sivakumar},
  title        = {{RRL:} theorem proving environment based on rewriting techniques},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {4},
  pages        = {67--68},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012497.1012522},
  doi          = {10.1145/1012497.1012522},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/KapurS85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/Kemmerer85,
  author       = {Richard A. Kemmerer},
  title        = {Overview of foundations},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {4},
  pages        = {75},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012497.1012527},
  doi          = {10.1145/1012497.1012527},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/Kemmerer85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/Lamb85,
  author       = {Rebecca Ann Lamb},
  title        = {More on software quality assurance},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {2},
  pages        = {45},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012621.1012628},
  doi          = {10.1145/1012621.1012628},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigsoft/Lamb85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/Landwehr85,
  author       = {Carl E. Landwehr},
  title        = {Does program verification help?: how much?},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {4},
  pages        = {107},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012497.1012542},
  doi          = {10.1145/1012497.1012542},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/Landwehr85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/Landwehr85a,
  author       = {Carl E. Landwehr},
  title        = {Some lessons from formalizing a security model},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {4},
  pages        = {111--112},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012497.1012545},
  doi          = {10.1145/1012497.1012545},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigsoft/Landwehr85a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/Lawrence85,
  author       = {J. L. Lawrence},
  title        = {Why is software always late?},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {1},
  pages        = {19--30},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012443.1012445},
  doi          = {10.1145/1012443.1012445},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/Lawrence85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/Lawrence85a,
  author       = {J. L. Lawrence},
  title        = {The {RC2000:} a software success story},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {1},
  pages        = {31--42},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012443.1012446},
  doi          = {10.1145/1012443.1012446},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/Lawrence85a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/Lee85,
  author       = {Kyu Y. Lee},
  title        = {Response to Jim Horning's letter},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {5},
  pages        = {30},
  year         = {1985},
  url          = {https://doi.org/10.1145/382288.382765},
  doi          = {10.1145/382288.382765},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/Lee85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/LevittW85,
  author       = {Karl N. Levitt and
                  R. Alan Whitehurst},
  title        = {Overview of applications},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {4},
  pages        = {95--96},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012497.1012537},
  doi          = {10.1145/1012497.1012537},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/LevittW85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/Loy85,
  author       = {Patrick H. Loy},
  title        = {System partitioning: a critical and often belittled development phase},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {2},
  pages        = {41--44},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012621.1012627},
  doi          = {10.1145/1012621.1012627},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/Loy85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/Macdonald85,
  author       = {Ruaridh Macdonald},
  title        = {Verifying a real system design: some of the problems},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {4},
  pages        = {126--129},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012497.1012549},
  doi          = {10.1145/1012497.1012549},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/Macdonald85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/MarcusCL85,
  author       = {Leo Marcus and
                  Stephen D. Crocker and
                  Jaisook Landauer},
  title        = {{SDVS:} a system for verifying microcode correctness},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {4},
  pages        = {7--14},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012497.1012502},
  doi          = {10.1145/1012497.1012502},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/MarcusCL85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/Mastro85,
  author       = {Vincent A. Mastro},
  title        = {Three dimensional system development},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {5},
  pages        = {47--59},
  year         = {1985},
  url          = {https://doi.org/10.1145/382288.382770},
  doi          = {10.1145/382288.382770},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/Mastro85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/MaurerB85,
  author       = {W. D. Maurer and
                  Tim E. Barrios},
  title        = {The parable of the two programmers, continued},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {2},
  pages        = {19--22},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012621.1012623},
  doi          = {10.1145/1012621.1012623},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigsoft/MaurerB85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/McHughN85,
  author       = {John McHugh and
                  Karl A. Nyberg},
  title        = {Ada verification using existing tools},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {4},
  pages        = {104--106},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012497.1012541},
  doi          = {10.1145/1012497.1012541},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigsoft/McHughN85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/McLean85,
  author       = {John McLean},
  title        = {Two dogmas of program specification},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {4},
  pages        = {85--87},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012497.1012532},
  doi          = {10.1145/1012497.1012532},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/McLean85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/Melliar-SmithR85,
  author       = {P. Michael Melliar{-}Smith and
                  John Rushby},
  title        = {The enhanced {HDM} system for specification and verification},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {4},
  pages        = {41--43},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012497.1012511},
  doi          = {10.1145/1012497.1012511},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/Melliar-SmithR85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/Miya85,
  author       = {Eugene N. Miya},
  title        = {On "Software engineering"},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {1},
  pages        = {12},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012443.1012444},
  doi          = {10.1145/1012443.1012444},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/Miya85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/Moore85,
  author       = {Martin J. Moore},
  title        = {Software engineering and {SDI}},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {5},
  pages        = {28},
  year         = {1985},
  url          = {https://doi.org/10.1145/382288.382762},
  doi          = {10.1145/382288.382762},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/Moore85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/Musser85,
  author       = {David R. Musser},
  title        = {{AIDS} to hierarchical specification structuring and reusing theorems
                  in {AFFIRM-85}},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {4},
  pages        = {2--4},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012497.1012500},
  doi          = {10.1145/1012497.1012500},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/Musser85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/Nelson85,
  author       = {David A. Nelson},
  title        = {Will the real {SE} metaphors please stand up!: (or, {I} never metaphor
                  {I} didn't like!)},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {5},
  pages        = {31--32},
  year         = {1985},
  url          = {https://doi.org/10.1145/382288.382766},
  doi          = {10.1145/382288.382766},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/Nelson85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/Neumann85,
  author       = {Peter G. Neumann},
  title        = {Review of "The Sachertorte algorithm and other antidotes to computer
                  anxiety" by John Shore. Viking 1985},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {2},
  pages        = {23--27},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012621.1012624},
  doi          = {10.1145/1012621.1012624},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/Neumann85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/Olenfeldt85,
  author       = {Lars Olenfeldt},
  title        = {A very short paper on the {OBJECT/EVENT-ANALYSIS}},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {1},
  pages        = {52--57},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012443.1012449},
  doi          = {10.1145/1012443.1012449},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/Olenfeldt85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/Owre85,
  author       = {Sam Owre},
  title        = {The Sytek theorem prover},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {4},
  pages        = {69},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012497.1012523},
  doi          = {10.1145/1012497.1012523},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/Owre85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/Parikh85,
  author       = {Girish Parikh},
  title        = {Software maintenance news},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {2},
  pages        = {58--59},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012621.1012632},
  doi          = {10.1145/1012621.1012632},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/Parikh85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/Parikh85a,
  author       = {Girish Parikh},
  title        = {Discovering the world of software maintenance: selected readings},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {5},
  pages        = {79--88},
  year         = {1985},
  url          = {https://doi.org/10.1145/382288.382775},
  doi          = {10.1145/382288.382775},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/Parikh85a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/Parikh85b,
  author       = {Girish Parikh},
  title        = {Software maintenance: penny wise, program foolish},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {5},
  pages        = {89--98},
  year         = {1985},
  url          = {https://doi.org/10.1145/382288.382774},
  doi          = {10.1145/382288.382774},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/Parikh85b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/Parker85,
  author       = {Jeff Parker},
  title        = {Towards more intelligent programming environments},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {3},
  pages        = {28--32},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012483.1012485},
  doi          = {10.1145/1012483.1012485},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/Parker85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/Parnas85,
  author       = {David Lorge Parnas},
  title        = {Software aspects of strategic defense systems},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {5},
  pages        = {15--23},
  year         = {1985},
  url          = {https://doi.org/10.1145/382288.382289},
  doi          = {10.1145/382288.382289},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/Parnas85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/PenteadoMG85,
  author       = {Ros{\^{a}}ngela Dellosso Penteado and
                  Paulo C{\'{e}}sar Masiero and
                  Fern{\~{a}}o Stella R. Germano},
  title        = {Structure charts for Jackson system development},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {3},
  pages        = {40--46},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012483.1012488},
  doi          = {10.1145/1012483.1012488},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/PenteadoMG85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/Pixon85,
  author       = {Mark R. Pixon},
  title        = {Enhancing {FDM} for the expression of concurrency requirements},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {4},
  pages        = {92--94},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012497.1012535},
  doi          = {10.1145/1012497.1012535},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/Pixon85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/Proctor85,
  author       = {Norman Proctor},
  title        = {The restricted access processor: an example of formal verification},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {4},
  pages        = {116--118},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012497.1012547},
  doi          = {10.1145/1012497.1012547},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/Proctor85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/Putnam85,
  author       = {Dan Putnam},
  title        = {The VERUS{\texttrademark} design verification system},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {4},
  pages        = {26--27},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012497.1012506},
  doi          = {10.1145/1012497.1012506},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/Putnam85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/Putnam85a,
  author       = {Dan Putnam},
  title        = {Separating methodology and specification constructs},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {4},
  pages        = {90--91},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012497.1012534},
  doi          = {10.1145/1012497.1012534},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/Putnam85a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/RamanathanR85,
  author       = {Jayashree Ramanathan and
                  John M. Rose},
  title        = {{TRIAD:} beyond isolated systems for development-in-the-large and
                  programming-in-the-small},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {5},
  pages        = {62--72},
  year         = {1985},
  url          = {https://doi.org/10.1145/382288.382772},
  doi          = {10.1145/382288.382772},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/RamanathanR85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/RamanathanVAR85,
  author       = {Jayashree Ramanathan and
                  Robert Vermilyer and
                  Thorbjorn Anderson and
                  John M. Rose},
  title        = {The use of a relational data base in method driven environments},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {5},
  pages        = {73--78},
  year         = {1985},
  url          = {https://doi.org/10.1145/382288.382773},
  doi          = {10.1145/382288.382773},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigsoft/RamanathanVAR85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/Reifer85,
  author       = {Donald J. Reifer},
  title        = {Review of "Principles of productive software management" by Michael
                  W. Evans, Pamela Piazza, and James B. Dolkes. John Wiley {\&}
                  Sons 1983},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {1},
  pages        = {58},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012443.1012450},
  doi          = {10.1145/1012443.1012450},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/Reifer85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/Reynolds85,
  author       = {Robert G. Reynolds},
  title        = {{PARTIAL:} a tool to monitor the stepwise refinement of Ada programs},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {3},
  pages        = {76--94},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012483.1012493},
  doi          = {10.1145/1012483.1012493},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/Reynolds85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/Rickert85,
  author       = {Neil W. Rickert},
  title        = {A system for managing shared files},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {2},
  pages        = {35--40},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012621.1012626},
  doi          = {10.1145/1012621.1012626},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/Rickert85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/Saaltink85,
  author       = {Mark Saaltink},
  title        = {Relational semantics},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {4},
  pages        = {82--83},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012497.1012530},
  doi          = {10.1145/1012497.1012530},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/Saaltink85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/Schultz85,
  author       = {David J. Schultz},
  title        = {Standard for the software life-cycle process},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {3},
  pages        = {62},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012483.1012491},
  doi          = {10.1145/1012483.1012491},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/Schultz85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/Schwartz85,
  author       = {David P. Schwartz},
  title        = {Summary of {IEEE} {CSM} {WG} meeting {\#}5, 23-25 Jan 85},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {2},
  pages        = {51--57},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012621.1012631},
  doi          = {10.1145/1012621.1012631},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/Schwartz85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/Smith85,
  author       = {Brian T. Smith},
  title        = {Position paper to be presented at "Verification workshop {III} (verkshop
                  III)" to be held in Watsonville, {CA.} Feb. 18-21, 1985},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {4},
  pages        = {61--62},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012497.1012520},
  doi          = {10.1145/1012497.1012520},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/Smith85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/SmithC85,
  author       = {Michael K. Smith and
                  Richard M. Cohen},
  title        = {Gypsy verification environment: status},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {4},
  pages        = {5--6},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012497.1012501},
  doi          = {10.1145/1012497.1012501},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/SmithC85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/SpinradA85,
  author       = {Mark D. Spinrad and
                  Curt Abraham},
  title        = {The Wild-West Lifecycle {(WILI)}},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {3},
  pages        = {47--48},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012483.1012489},
  doi          = {10.1145/1012483.1012489},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/SpinradA85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/Stokes85,
  author       = {R. Stokes},
  title        = {Some formal method activities in {UK} industry},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {4},
  pages        = {129--130},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012497.1012550},
  doi          = {10.1145/1012497.1012550},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/Stokes85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/TateD85,
  author       = {Graham Tate and
                  Thomas W. G. Docker},
  title        = {A rapid prototyping system based on data flow principles},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {2},
  pages        = {28--34},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012621.1012625},
  doi          = {10.1145/1012621.1012625},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigsoft/TateD85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/Taylor85,
  author       = {Tad Taylor},
  title        = {Verkshop position paper},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {4},
  pages        = {113--116},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012497.1012546},
  doi          = {10.1145/1012497.1012546},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/Taylor85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/Vito85,
  author       = {Ben Di Vito},
  title        = {Towards a definition of "Beyond AI" verification},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {4},
  pages        = {101--102},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012497.1012539},
  doi          = {10.1145/1012497.1012539},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/Vito85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/Ward85,
  author       = {Jean Renard Ward},
  title        = {{UNIX} as an environment for non-UNIX software development: a case
                  history},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {3},
  pages        = {95--108},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012483.1012494},
  doi          = {10.1145/1012483.1012494},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/Ward85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/Weiss85,
  author       = {David Weiss},
  title        = {Strategic defense initiative software feasibility (panel): panel discussion
                  at the 8th {ICSE}},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {5},
  pages        = {29},
  year         = {1985},
  url          = {https://doi.org/10.1145/382288.382763},
  doi          = {10.1145/382288.382763},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/Weiss85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/Whitehurst85,
  author       = {R. Alan Whitehurst},
  title        = {The need for an integrated design, implementation, verification and
                  testing methodology},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {4},
  pages        = {97--100},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012497.1012538},
  doi          = {10.1145/1012497.1012538},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/Whitehurst85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/Williams85,
  author       = {James G. Williams},
  title        = {Components of verification technology},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {4},
  pages        = {49--50},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012497.1012514},
  doi          = {10.1145/1012497.1012514},
  timestamp    = {Thu, 17 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/Williams85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/WilsonO85,
  author       = {William F. Wilson and
                  Sam Owre},
  title        = {Programmable heuristics for theorem provers},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {4},
  pages        = {70--71},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012497.1012524},
  doi          = {10.1145/1012497.1012524},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/WilsonO85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/Wing85,
  author       = {Jeannette M. Wing},
  title        = {Beyond functional behavior: combining methods to specify different
                  classes of properties of large systems},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {4},
  pages        = {102--104},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012497.1012540},
  doi          = {10.1145/1012497.1012540},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/Wing85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/X85,
  title        = {Abstracts in software engineering},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {1},
  pages        = {74--81},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012443.1012452},
  doi          = {10.1145/1012443.1012452},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/X85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/X85a,
  title        = {Questionnaire responses},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {2},
  pages        = {12--15},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012621.1012622},
  doi          = {10.1145/1012621.1012622},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/X85a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/X85b,
  title        = {Proceedings of the {ACM} Ada {TEC} "Future Ada environment workshop"},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {2},
  pages        = {77--117},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012621.1012634},
  doi          = {10.1145/1012621.1012634},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/X85b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/X85c,
  title        = {Abstracts in software engineering},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {2},
  pages        = {118--125},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012621.1012635},
  doi          = {10.1145/1012621.1012635},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/X85c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/X85d,
  title        = {Abstracts in software engineering},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {3},
  pages        = {109--117},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012483.1012495},
  doi          = {10.1145/1012483.1012495},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/X85d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/X85e,
  title        = {Old-fashioned logic for verification},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {10},
  number       = {4},
  pages        = {87--89},
  year         = {1985},
  url          = {https://doi.org/10.1145/1012497.1012533},
  doi          = {10.1145/1012497.1012533},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigsoft/X85e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics