Volume 13,
Number 1,
January 1987
- Israel Cidon, Jeffrey M. Jaffe, Moshe Sidi:
Local Distributed Deadlock Detection by Cycle Detection and Clustering.
3-14
- W. Kent Fuchs, Kun-Lung Wu, Jacob A. Abraham:
Comparison and Diagnosis of Large Replicated Files.
15-22
- Richard Koo, Sam Toueg:
Checkpointing and Rollback-Recovery for Distributed Systems.
23-31
- Frank C. H. Lin, Robert M. Keller:
The Gradient Model Load Balancing Method.
32-38
- Sunil K. Sarin, Nancy A. Lynch:
Discarding Obsolete Information in a Replicated Database System.
39-47
- Douglas B. Terry:
Caching Hints in Distributed Systems.
48-54
- William E. Weihl:
Distributed Version Management for Read-Only Actions.
55-64
- Andrew P. Black, Norman C. Hutchinson, Eric Jul, Henry M. Levy, Larry Carter:
Distribution and Abstract Types in Emerald.
65-76
- Phillip B. Gibbons:
A Stub Generator for Multilanguage RPC in Heterogeneous Environments.
77-87
- Michael L. Scott:
Language Support for Loosely Coupled Distributed Programs.
88-103
- Gregory R. Andrews, Richard D. Schlichting, Roger Hayes, Titus D. M. Purdin:
The Design of the Saguaro Distributed Operating System.
104-118
Volume 13,
Number 2,
February 1987
- Dorothy E. Denning, Selim G. Akl, Mark Heckman, Teresa F. Lunt, Matthew Morgenstern, Peter G. Neumann, Roger R. Schell:
Views for Multilevel Database Security.
129-140
- J. Thomas Haigh, William D. Young:
Extending the Noninterference Version of MLS for SAT.
141-150
- J. Daniel Halpern, Sam Owre, Norman Proctor, William F. Wilson:
Muse - A Computer Assisted Verification System.
151-156
- J. Thomas Haigh, Richard A. Kemmerer, John McHugh, William D. Young:
An Experience Using Two Covert Channel Analysis Techniques on a Real System Design.
157-168
- Virgil D. Gligor, C. Sekar Chandersekaran, Wen-Der Jiang, Abhai Johri, Gary L. Luckenbaugh, L. Edward Reich:
A New Security Testing Method and Its Application to the Secure Xenix Kernel.
169-183
- Daniel M. Berry:
Towards a Formal Basis for the Formal Development Method and the Ina Jo Specification Language.
184-201
- Richard Y. Kain, Carl E. Landwehr:
On Access Checking in Capability-Based Systems.
202-207
- Virgil D. Gligor, C. Sekar Chandersekaran, Robert S. Chapman, Leslie J. Dotterer, Matthew S. Hecht, Wen-Der Jiang, Abhai Johri, Gary L. Luckenbaugh, N. Vasudevan:
Design and Implementation of Secure Xenix.
208-221
- Dorothy E. Denning:
An Intrusion-Detection Model.
222-232
- Dan M. Nessett:
Factors Affecting Distributed System Security.
233-248
- Deborah Estrin:
Controls for Interorganization Networks.
249-261
- Judy H. Moore, Gustavus J. Simmons:
Cycle Structure of the DES for Keys Having Palindromic (or Antipalindromic) Sequences of Round Keys.
262-273
- Jonathan K. Millen, Sidney C. Clark, Sheryl B. Freedman:
The Interrogator: Protocol Security Analysis.
274-288
- Catherine Meadows, David Mutchler:
Matching Secrets in the Absence of a Continuously Available Trusted Authority.
289-292
- C. Gray Girling:
Covert Channels in LAN`s.
292-296
Volume 13,
Number 3,
March 1987
Volume 13,
Number 4,
April 1987
- Claude Boksenbaum, Michèle Cart, Jean Ferrié, Jean-François Pons:
Concurrent Certifications by Intervals of Timestamps in Distributed Database Systems.
409-419
- Francis Y. L. Chin, K. V. S. Ramarao:
An Information-Based Model for Failure-Handling in Distributed Database Systems.
420-431
- Bruce I. Blum:
A Paradigm for Developing Information Systems.
432-439
- Roland Mittermeir, Marcus Oppitz:
Software Bases for the Flexible Composition of Application Systems.
440-460
- Kazuo Matsumura, Hiroyuki Mizutani, Masahiko Arai:
An Application of Structural Modeling to Software Requirements Analysis and Design.
461-471
- Vaclav Rajlich:
Refinement Methodology for Ada.
472-478
- Heather W. Robb, Heinz Roland Weistroffer:
Performance Criteria for Constrained Nonlinear Programming Codes.
479-489
- Frank G. Pagan:
Program Structure Charts for Applicative Languages.
490-497
- Sun Zhongxiu, Li Xining:
CSM: A Distributed Programming Language.
497-500
- Gregor von Bochmann, Jean-Pierre Verjus:
Some Comments on "Transition-Oriented" Versus "Structured" Specification of Distributed Algorithms and Protocols.
501-505
Volume 13,
Number 5,
May 1987
- Takeshi Chusho:
Test Data Selection and Quality Estimation Based on the Concept of Esssential Branches for Path Testing.
509-517
- Behçet Sarikaya, Gregor von Bochmann, Eduard Cerny:
A Test Design Methodology for Protocol Testing.
518-531
- Yogeesh H. Kamath, Manton M. Matthews:
Implementation of an FP-Shell.
532-539
- Shmuel Katz, Oded Shmueli:
Cooperative Distributed Algorithms for Dynamic Cycle Prevention.
540-552
- John C. Knight, John I. A. Urquhart:
On the Implementation and Use of Ada on Fault-Tolerant Distributed Systems.
553-563
- Wei Zhao, Krithi Ramamritham, John A. Stankovic:
Scheduling Tasks with Resource Requirements in Hard Real-Time Systems.
564-577
- Jan Magott:
New NP-Complete Problems in Performance Evaluation of Concurrent Systems Using Petri Nets.
578-581
- R. Keith Scott, James W. Gault, David F. McAllister:
Fault-Tolerant Software Reliability Modeling.
582-592
- Raghubir N. Mathur:
Methodology for Business System Development.
593-601
- Shigeru Masuyama, Toshihide Ibaraki, Shojiro Nishio, Toshiharu Hasegawa:
Shortest Semijoin Schedule for a Local Area Distributed Database System.
602-606
Volume 13,
Number 6,
June 1987
- Steven P. Reiss:
Automatic Compiler Production: The Front End.
609-627
- Kay-Ulrich Felgentreu, Wolfram-Manfred Lippe, Friedemann H. Simon:
Optimizing Static Scope Lisp by Repetitive Interpretation of Recursive Function Calls.
628-635
- F. Warren Burton, Dieter Maurer, Hans-Georg Oberhauser, Reinhard Wilhelm:
A Space-Efficient Optimization of Call-by-Need.
636-642
- Sajal K. Das, V. K. Agrawal, Dilip Sarkar, Lalit M. Patnaik, P. S. Goel:
Reflexive Incidence Matrix (RIM) Representation of Petri Nets.
643-653
- Rajive Bagrodia, K. Mani Chandy, Jayadev Misra:
A Message-Based Approach to Discrete-Event Simulation.
654-665
- Roger D. Schultz, Alfonso F. Cardenas:
An Approach and Mechanism for Auditable and Testable Advanced Transaction Processing Systems.
666-676
- Robert P. Roe, John H. Rowland:
Some Theory Concerning Certification of Mathematical Subroutines by Black Box Testing.
677-682
- Gerard J. Holzmann:
Automated Protocol Validation in Argos: Assertion Proving and Scatter Searching.
683-696
- H. F. Li, W. K. Cheung:
An Empirical Study of Software Metrics.
697-708
- S. Bing Yao, Alan R. Hevner, Hélène Young-Myers:
Analysis of Database System Architectures Using Benchmarks.
709-725
- Chuan-Qi Zhu, Pen-Chung Yew:
A Scheme to Enforce Data Dependence on Large Multiprocessor Systems.
726-739
- S. Purushothaman, P. A. Subrahmanyam:
Reasoning About Probabilistic Behavior in Concurrent Systems.
740-745
- Michael J. Carey:
Improving the Performance of an Optimistic Concurrency Control Algorithm Through Timestamps and Versions.
746-760
Volume 13,
Number 7,
July 1987
- Ronald E. Prather, J. Paul Myers Jr.:
The Path Prefix Software Testing Strategy.
761-766
- Neal M. Bengtson:
Measuring Errors in Operational Analysis Assumptions.
767-776
- John C. Cherniavsky, Carl H. Smith:
A Recursion Theoretic Approach to Program Testing.
777-784
- Amihai Motro:
Superviews: Virtual Integration of Multiple Databases.
785-798
- Wiebren de Jonge, Andrew S. Tanenbaum, Reind P. van de Riet:
Two Access Methods Using Compact Binary Trees.
799-810
- Sushil Jajodia, Frederick N. Springsteel:
Construction of Universal Instances for Loop-Free Network Databases Using a Join-Like Operation.
811-819
- John D. Gannon, Richard G. Hamlet, Harlan D. Mills:
Theory of Modules.
820-829
- Peter Freeman:
A Conceptual Analysis of the Draco Approach to Constructing Software Systems.
830-844
- David N. Card, Frank E. McGarry, Gerald T. Page:
Evaluating Software Engineering Technologies.
845-851
- D. Ross Jeffery:
Time-Sensitive Cost Models in the Commercial MIS Environment.
852-859
- S. Misbah Deen, R. R. Amin, Malcolm C. Taylor:
Data Integration in Distributed Databases.
860-864
- Colin M. Davidson:
A Note on Concurrent Programming Control.
865-866
Volume 13,
Number 8,
August 1987
- Satish K. Tripathi, Yennun Huang, Sushil Jajodia:
Local Area Networks: Software and Related Issues.
872-879
- Brian N. Bershad, Dennis T. Ching, Edward D. Lazowska, Jan Sanislo, Michael F. Schwartz:
A Remote Procedure Call Facility for Interconnecting Heterogeneous Computer Systems.
880-894
- Rita C. Summers:
A Resource Sharing System for Personal Computers in a LAN: Concepts, Design, and Experience.
895-904
- Rakesh Agrawal, Ahmed K. Ezzat:
Location Independent Remote Execution in NEST.
905-912
- Jürgen Nehmer, Dieter Haban, Friedemann Mattern, Dieter Wybranietz, H. Dieter Rombach:
Key Concepts of the INCAS Multicomputer Project.
913-923
- Pradeep Jain, Simon S. Lam:
Modeling and Verification of Real-Time Protocols for Broadcast Networks.
924-937
- Wei Zhao, Krithi Ramamritham:
Virtual Time CSMA Protocols for Hard Real-Time Communication.
938-952
- David J. DeWitt, Raphael A. Finkel, Marvin H. Solomon:
The Crystal Multicomputer: Design and Implementation Experience.
953-966
- S. Ramesh, S. L. Mehndiratta:
A Methodology for Developing Distributed Programs.
967-976
- Je-Hao Wang, Tak-Sun Yuen, David Hung-Chang Du:
On Multiple Random Accesses and Physical Data Placement in Dynamic Files.
977-987
Volume 13,
Number 9,
September 1987
- Gregor von Bochmann, George Walter Gerber, Jean-Marc Serre:
Semiautomatic Implementation of Communication Protocols.
989-1000
- Guy T. Almes, Cara L. Holman:
Edmas: An Object-Oriented, Locally Distributed Mail System.
1001-1009
- Vijay Gurbaxani, Haim Mendelson:
Software and Hardware in Data Processing Budgets.
1010-1017
- Sam Yuan Sung:
Performance Analysis of Disk Modulo Allocation Method for Cartesian Product Files.
1018-1026
- Richard W. Selby, Victor R. Basili, Terry Baker:
Cleanroom Software Development: An Empirical Evaluation.
1027-1037
- Yuan Shi, Noah S. Prywes, Boleslaw K. Szymanski, Amir Pnueli:
Very High Level Concurrent Programming.
1038-1046
- Sushil Jajodia:
An Extension of "Representative Instances and gamma-Acyclic Relational Schemes".
1047-1048
Volume 13,
Number 10,
October 1987
Volume 13,
Number 11,
November 1987
Volume 13,
Number 12,
December 1987
- Sudhir Aggarwal, Daniel Barbará, Kalman Z. Meth:
SPANNER: A Tool for the Specification, Analysis, and Evaluation of Protocols.
1218-1237
- Pei-Jyun Leu, Bharat K. Bhargava:
Multidimensional Timestamp Protocols for Concurrency Control.
1238-1253
- Roger Hayes, Richard D. Schlichting:
Facilitating Mixed Language Programming in Distributed Systems.
1254-1264
- Veljko M. Milutinovic:
A Simulation Study of the Vertical-Migration Microprocessor Architecture.
1265-1277
- Victor R. Basili, Richard W. Selby:
Comparing the Effectiveness of Software Testing Strategies.
1278-1296
- Mark A. Holliday, Mary K. Vernon:
A Generalized Times Petri Net Model for Performance Analysis.
1297-1310
- K. H. Pun, Geneva G. Belford:
Performance Study of Two Phase Locking in Single-Site Database Systems.
1311-1328
- Y. H. Chin, Weng-Ling Peng:
An Evaluation of Two New Inference Control Methods.
1329-1339
- S. Biswas, V. Rajaraman:
An Algorithm to Decide Feasibility of Linear Integer Constraints Occurring in Decision Tables.
1340-1347
- Rakesh Agrawal, Michael J. Carey, Lawrence W. McVoy:
The Performance of Alternative Strategies for Dealing with Deadlocks in Database Management Systems.
1348-1363
- Norman Y. Foo:
Algebraic Specifications as Solutions of Implementation Equations.
1364-1369
- Hareton K. N. Leung, Hassan K. Reghbati:
Comments on Program Slicing.
1370-1371
Copyright © Fri Mar 12 17:34:07 2010
by Michael Ley (ley@uni-trier.de)