default search action
IEEE Transactions on Software Engineering (TSE), Volume 4
Volume 4, Number 1, January 1978
- Erol Gelenbe, Alain Kurinckx:
Random Injection Control of Multiprogramming in Virtual Memory. 2-17
- Shi-Kuo Chang, Wu-Haung Cheng:
Database Skeleton and Its Application to Logical Database Synthesis. 18-30 - Shi-Kuo Chang, Jyh-Sheng Ke:
Database Skeleton and Its Application to Fuzzy Query Translation. 31-44
- Seymour Ginsburg, Erica M. Rounds:
Dynamic Syntax Specification Using Grammar Forms. 44-55 - Marvin V. Zelkowitz, Howard J. Larsen:
Implementation of a Capability-Based Data Abstraction. 56-64
- Jayadev Misra:
A Technique of Algorithm Construction on Sequences. 65-69
- William E. Howden:
DISSECT-A Symbolic Evaluation and Program Testing System. 70-73 - Richard A. DeMillo, David P. Dobkin, Richard J. Lipton:
Even Data Bases That Lie Can Be Compromised. 73-75 - Sukhamay Kundu:
Note on a Constrained-Path Problem in Program Testing. 75-76 - Barry K. Rosen:
The Toy Language Syndrome. 76-77
Volume 4, Number 2, March 1978
- Terrence W. Pratt:
Control Computations and the Design of Loop Control Structures. 81-89 - David Gries:
The Multiple Assignment Statement. 89-93 - Robert Balzer, Neil M. Goldman, David S. Wile:
Informality in Program Specifications. 94-103 - George J. Schick, Ray W. Wolverton:
An Analysis of Competing Software Reliability Models. 104-120 - Alan Jay Smith:
A Comparative Study of Set Associative Memory Mapping Algorithms and Their Use for Cache and Main Memory. 121-130 - G. David Ripley, Ralph E. Griswold, David R. Hanson:
Performance of Storage Management in an Implementation of SNOBOL4. 130-137 - Harold S. Stone:
Sorting on STAR. 138-146 - Robert A. Ellis:
On the Interactiave Use of a Macroprocessor to Generate Operating System Batch Streams. 146-148
Volume 4, Number 3, May 1978
- Philip A. Bernstein, James B. Rothnie Jr., Nathan Goodman, Christos H. Papadimitriou:
The Concurrency Control Mechanism of SDD-1: A System for Distributed Databases (The Fully Redundant Case). 154-168 - Uno R. Kodres:
Analysis of Real-Time Systems by Data Flowgraphs. 169-178 - Tsun S. Chow:
Testing Software Design Modeled by Finite-State Machines. 178-187 - Edward T. Chen:
Program Complexity and Programmer Productivity. 187-194 - Per Brinch Hansen:
Network: A Multiprocessor Program. 194-199 - Zohar Manna, Richard J. Waldinger:
The Logic of Computer Programming. 199-229 - Santosh K. Shrivastava, Jean-Pierre Banâtre:
Reliable Resource Allocation Between Unreliable Processes. 230-241 - Alan C. Shaw:
Software Descriptions with Flow Expressions. 242-254 - Harold S. Stone:
Critical Load Factors in Two-Processor Distributed Systems. 254-258
Volume 4, Number 4, July 1978
- Laszlo A. Belady:
Guest Editorial for the Special Collection from the Third International Conference on Software Engineering. IEEE Trans. Software Eng. 4(4): 261-262 (1978) - Jan T. Pedersen, John K. Buckle:
Kongsberg's Road to an Industrial Software Methodology. 263-269 - Wolfgang Dzida, Siegfried Herda, Wolf D. Itzfeldt:
User-Perceived Quality of Interactive Systems. 270-276 - Donald L. Boyd, Antonio Pizzarello:
Introduction to the WELLMADE Design Methodology. 276-282 - William E. Riddle, Jack C. Wileden, John H. Sayler, Alan R. Segal, Allan M. Stavely:
Behavior Modeling During Software Design. 283-292 - William E. Howden:
Theoretical and Empirical Studies of Program Testing. 293-298 - Hannes Goullon, Rainer Isle, Klaus-Peter Löhr:
Dynamic Restructuring in an Experimental Operating System. 298-307 - Richard E. Merwin:
Guest Editorial - Software Management: We Must Find a Way. 307-308 - Barry C. De Roze, Thomas H. Nyman:
The Software Life Cycle-A Management and Technological Challenge in the Department of Defense. 309-318 - John D. Cooper:
Corporate Level Software Management. 319-326 - William C. Cave, Alan B. Salisbury:
Controlling the Software Life Cycle-The Project Management Task. 326-334 - Robert C. McHenry, Claude E. Walston:
Software Life Cycle Management: Weapons Process Developer. 334-344 - Lawrence H. Putnam:
A General Empirical Solution to the Macro Software Sizing and Estimating Problem. 345-361
Volume 4, Number 5, September 1978
- Per Brinch Hansen, Jørgen Staunstrup:
Specification and Implementation of Mutual Exclusion. 365-370 - Nissim Francez:
An Application of a Method for Analysis of Cyclic Programs. 371-378 - Shmuel Katz:
Program Optimization Using Invariants. 378-389 - Thomas F. Gannon, Stephen D. Shapiro:
An Optimal Approach to Fault Tolerant Software Systems Design. 390-409 - Jayadev Misra:
An Approach to Formal Definitions and Proofs of Programming Principles. 410-413 - Kuo-Chung Tai:
Syntactic Error Correction in Programming Languages. 414-425 - Armin B. Cremers, Thomas N. Hibbard:
Formal Modeling of Virtual Machines. 426-436 - Y. H. Chin:
An Analysis of "Distributed Free Space'' in an Operating and Data Management Systems Environment. 436-440 - Richard C. T. Lee, James R. Slagle, C. T. Mong:
Towards Automatic Auditing of Records. 441-448
Volume 4, Number 6, November 1978
- Warwick S. Ford:
Implementation of a Generalized Critical Region Construct. 449-455 - Charles Rich, Howard E. Shrobe:
Initial Report on a Lisp Programmer's Apprentice. 456-467 - Richard B. Kieburtz, Abraham Silberschatz:
Capability Managers. 467-477 - Jayadev Misra:
Some Aspects of the Verification of Loop Computations. 478-486 - Thomas Anderson, Peter A. Lee, Santosh K. Shrivastava:
A Model of Recoverability in Multilevel Systems. 486-494 - Lawrence A. Rowe, Fred M. Tonge:
Automating the Selection of Implementation Structures. 494-506 - Eralp A. Akkoyunlu, Arthur J. Bernstein, Fred B. Schneider, Abraham Silberschatz:
Conditions for the Equivalence of Synchronous and Asynchronous Systems. 507-516 - Gregor von Bochmann:
Compile Time Memory Allocation for Parallel Processes. 517-520 - Uno R. Kodres:
Discrete Systems and Flowcharts. 521-525 - Charles E. Hughes, Charles P. Pfleeger:
ASSIST-V: An Environment Simulator for IBM 360 Systems Software Development. 526-530 - George I. Davida, David J. Linton, C. Russel Szelag, David L. Wells:
Database Security. 531-533
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.