- Sam Harbaugh:
Beware of beware. ACM SIGSOFT Softw. Eng. Notes 10(2): 46 (1985) - Peter B. Henderson:
Software development/programming environments. ACM SIGSOFT Softw. Eng. Notes 10(2): 60-62 (1985) - Friedrich W. von Henke:
Reasoning with Hoare sentences. ACM SIGSOFT Softw. Eng. Notes 10(4): 84 (1985) - Jerrold Heyman, William M. Lively:
Syntax-directed editing revisited. ACM SIGSOFT Softw. Eng. Notes 10(3): 24-27 (1985) - Raymond J. Hookway:
Verifying Ada programs. ACM SIGSOFT Softw. Eng. Notes 10(4): 51-52 (1985) - Jim Horning:
Computing in support of battle management. ACM SIGSOFT Softw. Eng. Notes 10(5): 24-27 (1985) - Deepak Kapur, Paliath Narendran:
An equational approach to theorem proving in first-order predicate calculus. ACM SIGSOFT Softw. Eng. Notes 10(4): 63-66 (1985) - Deepak Kapur, G. Sivakumar:
RRL: theorem proving environment based on rewriting techniques. ACM SIGSOFT Softw. Eng. Notes 10(4): 67-68 (1985) - Richard A. Kemmerer:
Overview of foundations. ACM SIGSOFT Softw. Eng. Notes 10(4): 75 (1985) - Rebecca Ann Lamb:
More on software quality assurance. ACM SIGSOFT Softw. Eng. Notes 10(2): 45 (1985) - Carl E. Landwehr:
Does program verification help?: how much? ACM SIGSOFT Softw. Eng. Notes 10(4): 107 (1985) - Carl E. Landwehr:
Some lessons from formalizing a security model. ACM SIGSOFT Softw. Eng. Notes 10(4): 111-112 (1985) - J. L. Lawrence:
Why is software always late? ACM SIGSOFT Softw. Eng. Notes 10(1): 19-30 (1985) - J. L. Lawrence:
The RC2000: a software success story. ACM SIGSOFT Softw. Eng. Notes 10(1): 31-42 (1985) - Kyu Y. Lee:
Response to Jim Horning's letter. ACM SIGSOFT Softw. Eng. Notes 10(5): 30 (1985) - Karl N. Levitt, R. Alan Whitehurst:
Overview of applications. ACM SIGSOFT Softw. Eng. Notes 10(4): 95-96 (1985) - Patrick H. Loy:
System partitioning: a critical and often belittled development phase. ACM SIGSOFT Softw. Eng. Notes 10(2): 41-44 (1985) - Ruaridh Macdonald:
Verifying a real system design: some of the problems. ACM SIGSOFT Softw. Eng. Notes 10(4): 126-129 (1985) - Leo Marcus, Stephen D. Crocker, Jaisook Landauer:
SDVS: a system for verifying microcode correctness. ACM SIGSOFT Softw. Eng. Notes 10(4): 7-14 (1985) - Vincent A. Mastro:
Three dimensional system development. ACM SIGSOFT Softw. Eng. Notes 10(5): 47-59 (1985) - W. D. Maurer, Tim E. Barrios:
The parable of the two programmers, continued. ACM SIGSOFT Softw. Eng. Notes 10(2): 19-22 (1985) - John McHugh, Karl A. Nyberg:
Ada verification using existing tools. ACM SIGSOFT Softw. Eng. Notes 10(4): 104-106 (1985) - John McLean:
Two dogmas of program specification. ACM SIGSOFT Softw. Eng. Notes 10(4): 85-87 (1985) - P. Michael Melliar-Smith, John Rushby:
The enhanced HDM system for specification and verification. ACM SIGSOFT Softw. Eng. Notes 10(4): 41-43 (1985) - Eugene N. Miya:
On "Software engineering". ACM SIGSOFT Softw. Eng. Notes 10(1): 12 (1985) - Martin J. Moore:
Software engineering and SDI. ACM SIGSOFT Softw. Eng. Notes 10(5): 28 (1985) - David R. Musser:
AIDS to hierarchical specification structuring and reusing theorems in AFFIRM-85. ACM SIGSOFT Softw. Eng. Notes 10(4): 2-4 (1985) - David A. Nelson:
Will the real SE metaphors please stand up!: (or, I never metaphor I didn't like!). ACM SIGSOFT Softw. Eng. Notes 10(5): 31-32 (1985) - Peter G. Neumann:
Review of "The Sachertorte algorithm and other antidotes to computer anxiety" by John Shore. Viking 1985. ACM SIGSOFT Softw. Eng. Notes 10(2): 23-27 (1985) - Lars Olenfeldt:
A very short paper on the OBJECT/EVENT-ANALYSIS. ACM SIGSOFT Softw. Eng. Notes 10(1): 52-57 (1985)