ebook img

The Journal of Systems and Software 1996: Vol 32-35 Index PDF

7 Pages·1996·1.3 MB·English
by  
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview The Journal of Systems and Software 1996: Vol 32-35 Index

Author Index A Fromentin, E., 33:287 Abd-El-Hafiz, S.K., 34:89 Fruth, L.S., 32:227 Afshar, M., 35:29 Ahmad, I., 35:55 G Al-Saqabi, K., 35:55 Galliers, R.D., 33:189 Alonso, F., 33:65 Gao, J., 32:21 Altmann, J., 33:171 Gaspoz, J.-P., 33:253 Andersson, N., 32:185 Gates, A., 32:269 Arunachalam, V., 34:177 Geraci, B.J., 34:67 Getta, J.R., 33:179 B Glass, R.L., 32:1, 32:99, 32:183, 33:1, 34:1, Babaoglu, O., 33:287 34:85, 34:173, 35:1, 35:85, 35:93, 35:167 Basili, V.R., 34:89 Guidec, F., 33:239 Basumallick, S., 34:21 Gulezian, R., 33:81 Belkhouche, B., 34:67 Ben-Asher, Y., 33:313 H Benander, A.C., 32:73 Haber, G., 33:313 Benander, B.A., 32:73 Hawryszkiewycz, I.T., 33:179 Bertolino, A., 35:95 He, X., 35:15 Bieman, J.M., 33:205 Ho, W.W., 34:211 Braa, K., 33:123 Honiden, S., 33:207 Bradley, J., 33:87 Hsia, P., 32:21 Bratteteig, T., 33:133 Hsieh, C.S., 34:123 Briggs, P.L., 34:191 Huh, S.-Y., 34:231 Buehrer, D.J., 32:237, 35:67 Hui, L., 33:101 © J Campanai, M., 34:43 Jackson, W., 32:143 Canfield, G.C., 32:3 Jayaprakash, S., 35:217 Carpenter, C.L., 33:15 Jeffrey, H.J., 32:157 Carver, R.H., 33:223 Jézéquel, J.-M., 33:239 Chaib-draa, B., 33:37 Jmaiel, M., 33:299 Chang, C.C., 35:67, 35:199 Junkin, B., 34:151 Chang, R.-C., 35:43 Juristo, N., 33:65 Chang, T.-C., 32:215 Chen, C., 32:21 K Chen, C.Y., 35:199 Kagan, A., 34:31 Chung, S.-L., 33:101 Kan, C.-Y., 35:15 Cooke, D., 32:269 Kanevsky, A., 33:57 Cortes-Rello, E., 35:185 Karimi, J., 33:15, 34:191 Ketabchi, M.A., 32:41 D Khoshnevisan, H., 35:29 Damiani, M.L., 33:123 Kikuno, T., 35:119 Demirérs E, 32:269 Kinnunen, K., 33:141 Dietrich, S.W., 35:185 Kowng, H.C., 35:67 Doukidis, G.1., 33:189 Kramer B, 32:269 Kung, D.C., 32:21 F Kusumoto, S., 35:119 Fan, C., 35:185 Fan, Y.-W., 32:237 L Fei, Z., 32:135 Lai, C.-M., 32:215 Feng, L.-C., 35:43 Lam, K.-Y., 33:101 Feng, M.D., 32:251 Lee, J., 32:57 Fenton, N., 35:209 Lee, S.Y., 33:3 Fernandez, E.B., 35:141 Leppanen, M., 33:141 Finney, K., 35:209 Lewis, T.G., 32:143 Fritzson, P., 32:185 Lin, H.F., 35:199 J. SYSTEMS SOFTWARE 1996; 35:225-226 0164-1212/96/$15.00 © 1996 by Elsevier Science Inc. PIl S$0164-1212(96)00198-7 655 Avenue of the Americas, New York, NY 10010 226 J. SYSTEMS SOFTWARE Author Index 1996; 35:225-226 Ling, T.W., 34:3 S Liu, S., 35:151 Sadeghi, K.J., 32:41 Lokan, C.J., 32:65 Saleh, K., 35:55 Lopez, A.M., Jr., 34:151 Sasso, W., 34:177 Lu, J., 32:135 Schoonhoven, B., 33:153 Lutz, R.R., 34:223 Shah, P., 35:169 Lybereas, P., 33:189 Shieh, C.-K., 32:215 Shimura, H., 34L31 M Shin, H., 32:57 Mac, S.-C., 32:215 Sobol, M.G., 34:31 Maciaszek, L.A., 33:179 Srimani, P.K., 33:205 Maier, M.W., 32:101 Stott, J.W., 32:3 Marré M, 35:95 Maté JL, 33:65 T Mathews, J., 34:247 Tan, H.B.K., 34:3 Matsumoto, K.-i., 35:119 Tang, S.-M., 32:121 McDermid, J.A., 35:151 Tanik, M.M., 32:269 McGregor, L., 34:151 Tee, R.C.T., 35:199 Mili, A., 33:111 Tian, J, 35:127 Mili, H., 34:105 Torii, K., 35:119 Mills, K.L., 32:83 Toyoshima, Y., 32:21 Mitra, S., 34:161 Molinari, B., 34:133 U Motschnig-Pitrik, R., 33:113 Uchihira, N., 33:207 Moynihan, T., 33:163 Unger, E.A., 34:123 Muthukrishnan, C.R., 35:217 N Vv Natarajan, S., 33:57 van Slooten, K., 33:153 Nechvatal, J., 35:73 Nesi, P., 34:43 Ww Nitsche, U., 33:273 Warren, J.R., 32:3 Norcio, A.F., 32:3 White, E.L., 32:227 Wilson, R.L., 32:143 Oo Wong, J., 35:169 Ogrim, L., 33:111 Wong, J.S.K., 34:21, 34:161 Olsson, R.A., 34:211 Wrycza, S., 33:111 Owolabi, O., 34:127 Wu, J., 35:141 P Y Pacherie, J.-L., 33:239 Yee, J.J., 32:251 Park, D.-W., 33:57 Pasquini, A., 35:107 Yuen, C.K., 32:251 Pazos, J., 33:65 Poo, D.C.C., 33:3 Z Pu, H., 32:73 Zelkowitz, M.V., 35:3 Purtilo, J.M., 32:227 Zhang, L., 33:37 Zhang, M., 35:141 R Zhao, L., 32:143 Raynal, M., 33:287 Zhou, W., 34:133 Rosenberg, D.A., 34:231 Zhu, J., 32:143 Rumerstorfer, H., 33:171 Zupantit, J., 33:111 Subject Index A Cognitive processes, program compre- Creativity, computers and, 34:85 Abstract distributed programs, constraint hension, 34:177 based approach for testing, 33:223 Communication, client/developer, D Abstraction levels, prototyping and, 36:47 functional-decomposition vs. Data analysis, intrusion detection, 33:101 Academe, industry vs., 35:167 object-orientation and, 33:163 Data exploration, advanced browsing Algebra, extended relational, 33:87 Communication protocols service for heterogenous, 33:123 Algebraic Petri nets, structured analysis concurrent failures recovery in, Data-intensive business programs, methods and, 35:15 35:55 components reuse for, 34:3 Algorithms temporal logic for specification Data-parallelism, object-oriented frame- classified, public key escrow of, 33:299 work for supercomputing and, system and, 35:73 Commutative redundancy, memoisation 33:239 fault-tolerant, mutual exclusion in techniques and, 35:29 Databases distributed system, 35:217 Components reuse, data-intensive distributed systems linear-time, control structure of business programs and, 34:3 design and implementation, program slice and, 34:123 Compositional adjustment, MENDELS 34:21 parallel searching, 32:121 ZONE and, 33:207 fragmentation transparency, Ziegler’s sparse matrix compres- Comprehension, recursive vs. iterative 35:185 sion, improvement, 35:67 code constructs, 32:73 nonblocking timed atomic Application software package, acquisition Compression algorithm, Ziegler’s sparse commit protocol for real-time, and implementation process, 32:57 matrix, improvement, 35:67 34:161 Asynchronous distributed cooperation, Computer science, mathematics and, object-oriented coordination and artifact semantics 34:173 change management framework in, 33:179 Computers, creativity and, 34:85 and, 34:231 Asynchronous write facility, metadata Computing history, unusual phenomenon, concurrency control in, 35:169 and, 35:43 34:1 indexing structure for, 32:237 Conceptual modeling, semantics and, relational approach vs., 33:87 B 33:113 object technology, application to BaLinda suite, parallelism and, 32:251 Concurrency control, object-oriented software analysis and maintenance Behavior abstraction, verification tech- databases and, 35:169 system, 32:41 nique and large distributed systems Concurrent failures, communication relational approach and, 33:273 protocols and recovery from, 35:55 object-oriented vs., 33:87 Behavioral descriptions, object-oriented Concurrent partial match retrieval, performance criteria, 34:31 modeling and, 34:105 multiple key hashing files and, ddgraph arcs, branch testing and uncon- BOOM, 33:171 35:199 strained, 35:95 Branch coverage, bound on number of Concurrent programming, nondeter- Debugging tools, layered model for build- test cases for, 35:95 minism and, 33:207 ing monitoring and, 34:211 Browsing service, heterogenous data Concurrent systems, algebraic Petri nets Dependency maintenance, change man- exploration with advanced, 33:123 and specification ofd istributed agement framework and, 34:231 and, 35:15 Dictionary organization, efficient similar- Cc Conferences ity retrieval and, 34:127 C program, early size prediction, 32:65 creativity and computers, 34:85 Distributed systems Calibrated Airborne Multispectral International Conference on Infor- abstract, constraint-based approach Scanner (CAMS), gross feature mation Systems Development, for testing, 33:223 detection in remotely sensed data, 33:111 algebraic Petri nets and specifica- 34:15] Constraint-based approach, testing ab- tion of concurrent and, 35:15 Change management framework, depen- stract distributed programs, 33:223 databases dency maintenance and change Constraints, behavioral descriptions in design and implementation, notification with, 34:231 object-oriented modeling and, 34:21 Change notification, change management 34:105 nonblocking timed atomic framework and, 34:231 Contingency factors, information systems commit protocol for real-time, Client/developer communication, development, 33:153 34:161 functional-decomposition vs Control structure, program slice, 34:123 fault-tolerant algorithm for mutual object-orientation and, 33:163 Coordination and artifact semantics, exclusion in, 35:217 Code components, documentation, 34:89 asynchronous distributed coopera- fragmentation transparency in Code constructs, comprehension of recur- tion and, 33:179 databases, 35:185 sive vs. iterative, 32:73 Cost constraints, hybrid fault-tolerant software engineering for, introduc- Code generator generators, overview and software design and modeling tion, 33:205 industrial application, 32:185 with, 35:141 specification and run-time detec- J. SYSTEMS SOFTWARE 1996; 35:227-230 0164-1212/96/$15.00 © 1996 by Elsevier Science Inc. PII S0164-1212(96)00199-9 655 Avenue of the Americas, New York, NY 10010 228 $j. SYSTEMS SOFTWARE Subject Index 1995; 35:227-230 tion of dynamic properties in, H Linear-time algorithm, control structure 33:287 Hard real-time software system, HaRTS, of program slice and, 34:123 verification technique for large, 32:143 Linguistic framework, prototyping and, 33:273 HaRTS, hard real-time software develop- 36:47 Distributed telecommunication services ment environment, 32:143 Loops, analysis, 34:89 development, object-oriented Higher order software (HOS) specifica- methodology for, 33:253 tion, verification, 32:135 M Documentation, code components, 34:89 History, computing, unusual phenom- Management, productivity and, 35:1 Domain fault detection, test selection enon, 34:1 Mathematics, computer scientist and, criterion for, 35:107 Holonic organizational systems, object- 34:173 Domain policies, object-oriented tech- oriented programming and, 34:247 Memo-functions, space-efficient, 35:29 nique and, 33:14 MENDELS ZONE, compositional adjust- Domain test selection criterion, empirical I ment and, 33:207 validation, 35:107 Indexing structure, object-oriented data- Metadata, asynchronous write facility bases, 32:237 and, 35:43 E Industry Methodology engineering, object/activity Editorial policy, Journal of Systems and academe vs., 35:167 (O/A) matrix and, 33:141 Software, 32:1 formal methods and, 35:209 Metric framework, for object-oriented Efficiency measures Information systems real-time systems specification relational databases in different design, simulation environment, languages, 34:43 normal forms, 34:31 32:3 Modeling, integrated, software design simulators for inefficiency detec- development and, 32:101 tion parallel programs, 33:131 contingency factors, 33:153 Monitoring tools, layered model for Environment attributes, modeling soft- object/activity (O/A) matrix and, building debugging and, 34:211 ware engineering, 35:3 33:141 Motivation, goals and, 35:167 Escrow system, public key, 35:73 object-oriented framework and, Multi-paradigm software approach, gross 33:3 feature detection in remotely F International Conference on Infor- sensed imagery, 34:151 Factor analysis technique, partial match mation Systems Development, Multiple key hashing files, concurrent queries and, 32:121 33:111 partial match retrieval and, Fault detection planning, small business, 33:189 35:199 empirical validation for domain, redesign process, 33:133 Multiprocessor machines, design 35:107 Institutions, Systems and Software Engi- methodology for real-time systems evaluation of time allocation pro- neering scholars and, 35:85 and, 33:37 cedure for technical reviews, Integrated modeling, software design and, 35:119 32:101 N Fault-tolerant algorithm, mutual exclu- Integrated software engineering environ- Nondeterminism, concurrent program- sion in distributed system, 35:217 ments, model, 35:3 ming and, 33:207 Fault-tolerant software, design and mod- International Conference on Information eling with cost constraints, 35:14] Systems Development, 33:11 1 oO Fault trees, safety analysis with, 35:151 Interoperability, model for development Object/activity (O/A) matrix, methodol- File system, performance improvement, environments and, 35:3 ogy engineering and, 33:141 35:43 Intrusion detection, data reduction Object-based knowledge representation Fixed-priority scheduling, utilization method for, 33:101 system, industrial application, bounds and, 33:57 Iteration, comprehension time and, 32:73 33:123 Formal methods Object-linking mechanism, component- industrial use, 35:209 J based software development software research, 32:99 Journal of Systems and Software, edito- environments and, 32:227 Formality, prototyping and, 36:47 rial policy, 32:1 Object-oriented approaches Fragmentation transparency, distributed client/developer communication system databases and, 35:185 K and functional-decomposition vs., Functional-decomposition, client/devel- Key escrow system, public, 35:73 33:163 oper communication and object- Knowledge-based systems, software distributed telecommunication orientation vs., 33:163 maintenance support for, 34:191 services development and, 33:253 Functional testing, specification tech- Knowledge engineering, software engi- information systems development, niques and, 32:83 neering and, 33:65 33:3 relational vs., 33:87 G L software development, 33:1 Goals, motivation and, 35:167 Languages, single-paradigm vs. mixed- supercomputing and, 33:239 Government, public key escrow system representation, software mainte- Object-oriented databases and, 35:73 nance and, 34:191 change management framework Gross feature detection, remotely sensed Law enforcement agency, public key es- and, 34:231 imagery and, 34:151 crow system and, 35:73 concurrency control in, 35:169 Growth analysis, information systems Layering, building debugging and moni- Object-oriented fourth generation system, planning in small business, 33:189 toring tools and, 34:21 1 BOOM, 33:171 Subject Index J. SYSTEMS SOFTWARE 229 1995; 35:227-230 Object-oriented modeling, behavioral Recursion, comprehension time and, Software crisis, management issues, descriptions, 34:105 32:73 32:183 Object-oriented programming Redesign process, organization in infor- Software design organizational foundations, 34:247 mation systems, 33:133 concurrent failures recovery in regression testing and, 32:21 Redundancy, commutative, memoisation communication protocols, 35:55 Object-oriented real-time systems specifi- techniques and, 35:29 distributed database system, 34:21 cation languages, metric frame- Register allocations, code generator hybrid fault-tolerant software work for, 34:43 generators and, 32:185 design and modeling with cost Object-oriented specification architecture, Regression subsets, software modeling constraints, 35:141 components resue for data-inten- and, 33:81 integrated modeling, 32:101 sive business programs and, 34:3 Regression testing, object-oriented object-oriented framework for Object technology, software analysis and programs and, 32:21 supercomputing, 33:239 maintenance system and, 32:41 Relational approach, object-oriented vs., partitioning technique and, 33:15 Open systems, model for development 33:87 Software development environments and, 35:3 Remote procedure call transaction application software package manager, 34:133 acquisition and implementation P Remotely sensed data, gross feature process, 32:57 Parallel languages, BaLinda suite, 32:251 detection in, 34:151 C and PASCAL program size pre- Parallel programs Row displacement method, Ziegler’s, diction, 32:65 simulators for inefficiency detec- 35:67 cost estimation, 32:65 tion, 33:131 Run-time detection, distributed computa- evaluation of time allocation pro- software fault-tolerant mechanisms tions and dynamic property, 33:287 cedure for technical reviews, for, 32:215 35:119 Parallel searching, data organizing Ss HaRTS, 32:143 algorithm for, 32:121 Safety analysis, fault trees and, 35:151 methodologies, 35:93 Partial match queries, data organizing Safety critical systems object-linking mechanism for com- algorithm for, 32:121 safety analysis with fault trees, ponent-based software develop- Partitioning technique, concurrent soft- 35:15] ment environments, 32:227 ware design and, 33:15 targeting safety-related errors dur- object-oriented approaches, 33:1 PASCAL program, early size prediction, ing software requirements analysis, specification languages, 32:269 32:65 34:223 specification techniques for Pattern matching, code generator genera- Safety-related errors, software require- functional testing, 32:83 tors and, 32:185 ments analysis and, 34:223 test tracking and analysis, 35:127 Performance criteria, relational databases Satellite image, gross feature detection in verification of higher order soft- in different normal forms, 34:31 remotely sensed data, 34:151 ware (HOS), 32:135 Petri nets, structured analysis methods Scheduling Software engineering and algebraic, 35:15 fixed-priority, utilization bounds distributed computing systems and, Productivity, management and, 35:1 and, 33:57 introduction, 33:205 Program comprehension, cognitive simulator parameters and detection environment attributes, 35:3 processes in, 34:177 of harmful, 33:313 essential difficulties, 32:157 Program documentation, 34:89 Scholars, Systems and Software Engi- hype, 34:1 Program slice, control structure, 34:123 neering institutions and, 35:85 integrated modeling, 32:101 Programming Searching dictionaries, efficient similarity knowledge engineering and, 33:65 concurrent, nondeterminism and, retrieval and, 34:127 layered model for building moni- 33:207 Secret-key cryptography, public key toring and debugging tools, 34:21 1 object-oriented, organizational escrow system and, 35:73 object-oriented programming, foundations, 34:247 Semantics organizational foundations, 34:247 Protocols conceptual modeling and, 33:113 support for knowledge-based concurrency control, object-ori- coordination and artifact, asyn- systems, 34:19] ented databases and, 35:169 chronous distributed cooperation Software errors, targeting safety-related, concurrent failures recovery in and, 33:179 34:223 communication, 35:55 Similarity retrieval, dictionary organiza- Software fault-tolerant mechanisms, distributed real-time database and tion for efficient, 34:127 parallel programming systems and, nonblocking timed atomic commit, Simulation environment, information 32:215 34:161 systems design and, 32:3 Software maintenance temporal logic and, 33:299 Simulator parameters, harmful scheduling object technology and, 32:41 Prototyping system, formal setting for, detection and, 33:313 regression testing and, 32:21 35:67 SL-trees, indexing structure for object- support for knowledge-based oriented databases, 32:237 systems, 34:191 R Slice, control structure of program, Software modeling, regression subsets Real-time systems 34:123 and, 33:81 design methodology for multipro- Small business, information systems Software reengineering, cognitive cessor machines, 33:37 planning, 33:189 processes in program comprehen- fixed-priority scheduling using uti- Software analysis, object technology and, sion, 34:177 lization bounds, 33:57 32:41 Software requirements, targeting safety- 230 J. SYSTEMS SOFTWARE Subject Index 1995; 35:227-230 related errors during analysis, Structured analysis methods, algebraic evaluation for technical reviews, 34:223 Petri nets and, 35:15 35:119 Software research, formal methods, 32:99 Supercomputing, object-oriented frame- Timed atomic commit protocol, distrib- Software specification work for, 33:239 uted real-time database and languages, 32:269 Systems and Software Engineering schol- nonblocking, 34:161 verification of higher order soft- ars and institutions, 35:85 Transaction management, remote proce- ware (HOS), 32:135 dure call, 34:133 Software testing, branch testing, 35:95 T Vv Space-efficient memo-functions, 35:29 Technical reviews, evaluation of time V X V, empirical validation, 35:107 Specification languages allocation procedure for, 35:119 Verification abstraction, verification tech- functional phase support, 32:269 Telecommunication services, develop- nique and large distributed systems object-oriented real-time systems, ment of distributed, 33:253 and, 33:273 metric framework for, 34:43 Temporal logic, specification of commu- Verification technique, large distributed Specification techniques nication protocols using, 33:299 systems and, 33:273 distributed computations and Terminological ambiguities, conceptual dynamic property, 33:287 modeling and, 33:113 Z for functional testing, 32:83 Test tracking and analysis, integrated Z, evaluating effectiveness, 35:209 Statistical methods, software modeling approach, 35:127 Ziegler’s sparse matrix compression and, 33:81 Time allocation procedure, experimental algorithm, improvement, 35:67

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.