default search action
Operating Systems Review, Volume 34, 2000
Volume 34, Number 1, January 2000
- Tyrone Nicholas, Jerzy A. Barchanski:
Overview of TOS: A Distributed Educational Operating System in Java. 2-10 - Rohit Dube:
Scalable Hierarchical Coarse-grained Timers. 11-20 - Kun Yang, Xin Guo, Dayou Liu:
Security in Mobile Agent System: Problems and Approaches. 21-28
Volume 34, Number 2, April 2000
- Jay Lepreau, Eric Eide:
Session Summaries from the 17th Symposium on Operating Systems Principles (SOSP'99). 4-41 - Yibei Ling, Tracy Mullen, Xiaola Lin:
Analysis of Optimal Thread Pool Size. 42-55 - Marc Lacoste:
Towards a Secure Platform for Distributed Mobile Object Computing. 56-73 - Sanglu Lu, Li Xie:
Scalable Scheduling on a Network of Workstations. 74-83 - Ximing Chen, Xianliang Lu:
Runtime Incremental Concentrated Scheduling on NOW(NRICS). 84-96
Volume 34, Number 3, July 2000
- John A. Trono, William E. Taylor:
Further comments on "A correct and unrestrictive implementation of general semaphores". 5-10 - Baowen Xu:
Tagged Semaphores. 11-15 - Pengjun Pei, Guohua Cui, Kun Peng:
On a Session Key Compromise Problem in [KC95] protocol. 16-18 - Yongxing Sun, Xinmei Wang:
An approach to finding the attacks on the cryptographic protocols. 19-28 - Li Ji, Li Tianning, Guihai Chen, Xie Lie, C. L. Wang:
Strategies Optimization and Integration in DSM. 29-39 - Kamil Iskra, Frank van der Linden, Zeger W. Hendrikse, Benno J. Overeinder, G. Dick van Albada, Peter M. A. Sloot:
The implementation of Dynamite - an environment for migrating PVM tasks. 40-55 - Chris J. Mitchell:
Making serial number based authentication robust against loss of state. 56-59 - Abdelmadjid Bouabdallah, Christian Laforest:
A Distributed token/based Algorithm for the Dynamic Resource Allocation Problem. 60-68 - G. Alan Creak, Robert Sheehan:
A Top-Down Operating System Course. 69-80
Volume 34, Number 4, October 2000
- William E. Weihl:
SIGOPS 2000 Annual Report. 1-3 - Valérie Issarny:
Upcoming Events in Operating System Research. 4-6 - John A. Trono:
Comments on "Tagged Semaphores". 7-11 - Chun-Li Lin, Hung-Min Sun, Tzonelih Hwang:
Three-party Encrypted Key Exchange: Attacks and A Solution. 12-20 - Delano M. Beder, Alexander B. Romanovsky, Brian Randell, C. Richard Snow, Robert J. Stroud:
An Application of Fault Tolerance Patterns and Coordinated Atomic Actions to a Problem in Railway Scheduling. 21-31 - Mahadev Satyanarayanan:
Caching Trust Rather Than Content. 32-33 - José María Sierra, Simon J. Shepherd:
New Phase 1 Exchange Mode for IKE framework. 34-40 - Gerco Ballintijn, Maarten van Steen:
Characterizing Internet Performance to Support Wide-area Application Development. 41-47 - Michael Sonntag, Rudolf Hörmanseder:
Mobile agent security based on payment. 48-55 - Laurence Duchien, Gerard Florin, Lionel Seinturier:
Partial Order Relations in Distributed Object Environments. 56-75 - Henri E. Bal, Raoul Bhoedjang, Rutger F. H. Hofman, Ceriel J. H. Jacobs, Thilo Kielmann, Jason Maassen, Rob van Nieuwpoort, John Romain, Luc Renambot, Tim Rühl, Ronald Veldema, Kees Verstoep, Aline Baggio, Gerco Ballintijn, Ihor Kuz, Guillaume Pierre, Maarten van Steen, Andrew S. Tanenbaum, Gerben Doornbos, Desmond Germans, Hans J. W. Spoelder, Evert Jan Baerends, Stan J. A. van Gisbergen, Hamid Afsermanseh, G. Dick van Albada, Adam Belloum, David Dubbeldam, Zeger W. Hendrikse, Louis O. Hertzberger, Alfons G. Hoekstra, Kamil Iskra, Drona Kandhai, Dennis C. Koelma, Frank van der Linden, Benno J. Overeinder, Peter M. A. Sloot, Piero Spinnato, Dick H. J. Epema, Arjan J. C. van Gemund, Pieter P. Jonker, Andrei Radulescu, Kees van Reeuwijk, Henk J. Sips, Peter M. W. Knijnenburg, Michael S. Lew, Floris Sluiter, Lex Wolters, Hans Blom, Cees de Laat:
The Distributed ASCI Supercomputer Project. 76-96
Volume 34, Number 5, December 2000
- Larry Rudolph, Anoop Gupta:
ASPLOS-IX Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems, Cambridge, MA, USA, November 12-15, 2000. ACM Press 2000, ISBN 1-58113-317-0 [contents]
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.