ISI Technical Reports

This section contains all Technical Reports published by ISI over the past several decades. The search box below enables searches by report titles, authors and report numbers. Technical Reports written by ISI researchers, but not published by ISI, may be available through the author’s individual website.

To be assigned a technical report number, please contact Computing Information Services.

Journal articles and other publications can be found here.

ABSTRACTION and VERIFICATION in ALPHARD: Introduction to Language and Methodology
W. , W. , L. , R. , S. , and M.
June, 1976

Protection Errors in Operating Systems: Allocation/Deallocation Residuals
Hollingworth, D. and Bisbey, R.
June, 1976

Design Considerations for a Computerized Message Service Based on Washington, D.C. Navy Personnel
H. , J. F. , Y. , M. D. , R. , and J. G.
May, 1976

Proteus: An Activation Framework for Cognitive Process Models
L. and J. A.
May, 1976

Protection Errors in Operating Systems: Validation of Critical Conditions
C. and J.
May, 1976

XED User's Manual: Beginning Instruction
I. S. I. Staff
May, 1976

Specifications for the Network Voice Protocol (NVP)
Cohen, D.
March, 1976

Data Dependency Analysis
C. and J.
February, 1976

Imprecise Program Specification
Balzer, R.M.
December, 1975

Protection Errors in Operating Systems: Inconsistency of a Single Data Value Over Time
C. , J. , P. , and G.
December, 1975