


Остановите войну!
for scientists:


default search action
Journal of Systems and Software (JSS), Volume 43
Volume 43, Number 1, October 1998
- Editorial. 1-2
- Sadahiro Isoda:
A criticism on the capture-and-recapture method for software reliability assurance. 3-10 - Norman Wilde, Christopher Casey, Joseph Vandeville, Gary P. Trio, Dick Hotz:
Reverse engineering of software threads: A design recovery technique for large multi-process systems. 11-17 - Mikael Lindvall, Kristian Sandahl:
How well do experienced software developers predict software change? 19-27 - Alexander B. Romanovsky:
A study of atomic action schemes intended for standard Ada. 29-44 - Ioannis P. Vlahavas:
Exploiting and-or parallelism in Prolog: The OASys computational model and abstract architecture. 45-57 - Robert L. Glass:
An assessment of systems and software engineering scholars and institutions (1993-1997). 59-64 - Ronald F. Ayres:
A narrative history and description of MOSIS software. 67-82
Volume 43, Number 2, November 1998
- Editorial. 83-84
- Václav Rajlich, Shivkumar Ragunathan:
A case study of evolution in object oriented and heterogeneous architectures. 85-91 - Koenraad De Bosschere:
TARILAN: an embedded functional data processing language. 93-102 - H. Rex Hartson:
Human-computer interaction: Interdisciplinary roots and trends. 103-118 - Chye-Lin Chee, Stanislaw Jarzabek, R. Paul:
F-metric: a WWW-based framework for intelligent formulation and analysis of metric queries. 119-132 - Vassilis C. Gerogiannis
, Achilles Kameas, Panayiotis E. Pintelas:
Comparative study and categorization of high-level petri nets. 133-160
Volume 43, Number 3, November 1998
- Editorial. 161-163
- Ravindra Krovi, Akhilesh Chandra:
User cognitive representations: The case for an object oriented model. 165-176 - Wilhelm Hasselbring, Andreas Kröber:
Combining OMT with a prototyping approach. 177-185 - Wilhelm Hasselbring:
The ProSet-Linda approach to prototyping parallel systems. 187-196 - Jiannong Cao, Kang Zhang, Olivier Y. de Vel:
On heuristics for optimal configuration of hierarchical distributed monitoring systems. 197-206 - Jeff Matocha, Tracy Camp:
A taxonomy of distributed termination detection algorithms. 207-221 - Kam-yiu Lam, Wai-cheong Yau:
On using similarity for concurrency control in real-time database systems. 223-232 - Qi Shi
, Ning Zhang:
An effective model for composition of secure systems. 233-244

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.