


default search action
Operating Systems Review, Volume 32, 1998
Volume 32, Number 1, January 1998
- Carla Schlatter Ellis:
SIGOPS README. 1-2 - Edward A. Feustel, Terry Mayfield:
The DGSA: Unmet Information Security Challenges for Operating System Designers. 3-22 - Birgit Pfitzmann, Michael Waidner
:
How to Break Fraud-Detectable Key Recovery. 23-28 - Theodore Faber:
Optimizing Throughput in a Workstation-based Network File System over a High Bandwidth Local Area Network. 29-40 - Özalp Babaoglu
, Renzo Davoli
, Alberto Montresor, Roberto Segala
:
System Support for Partition-Aware Network Applications. 41-56 - Yanxiang He, Donald H. Cooley, Jianping Zhang:
Planning Management of Multiagent-Based Distributed Open Computing Environment Model. 57-64
Volume 32, Number 2, April 1998
- William M. Waite:
Is Operating Systems Review Obsolete? 1 - Günter Haring, Christoph Lindemann, Martin Reiser:
International Workshop Performance Evaluation - Origins and Directions. 2-3 - Marco de Vivo, Gabriela O. de Vivo, Germinal Isern:
Internet Security Attacks at the Basic Levels. 4-15 - Stefanos Gritzalis
, George Aggelis:
Security Issues Surrounding Programming Languages for Mobile Code: Java vs. Safe-Tcl. 16-32
Volume 32, Number 3, July 1998
- William M. Waite:
Is Operating Systems Review Obsolete? 1-2 - Shouhuai Xu, Gendu Zhang, Hong Zhu:
On the Security of Three-Party Cryptographic Protocols. 7-20 - Amjad Mahmood:
Task Allocation in Distributed Computing Systems. 21-29 - Sung-Il Kang, Heung-Kyu Lee:
Analysis and Solution of Non-preemptive Policies for Scheduling Readers and Writers. 30-50 - George Dimitoglou:
Deadlocks and Methods for their Detection, Prevention and Recovery in Modern Operating Systems. 51-54 - Sanglu Lu, Li Xie:
A Scalable Load Balancing System for NOWs. 55-63 - Zhonghua Yang, Chengzheng Sun:
CORBA For Hard Real Time Applications: Some Critical Issues. 64-71 - Rajesh Bordawekar:
A Case for Compositional File Systems (Extended Abstract). 72-80
Volume 32, Number 4, October 1998
- Geoffrey M. Voelker:
Report on the SIGMETRICS '98/PERFORMANCE '98 Joint International Conference on Measuerment and Modeling of Computer Systems. 3-8 - Ross J. Anderson, Francesco Bergadano
, Bruno Crispo, Jong-Hyeon Lee, Charalampos Manifavas, Roger M. Needham:
A New Family of Authentication Protocols. 9-20 - Chris J. Mitchell
, Chan Yeob Yeun:
Fixing a Problem in the Helsinki Protocol. 21-24 - Danai Patiyoot, Simon J. Shepherd:
Techniques for Authentication Protocols and Key Distribution on Wireless ATM Networks. 25-32 - Marc Joye, Sung-Ming Yen:
ID-based Secret-Key Cryptography. 33-39 - Bernhard Wagner:
Controlling Cgi Programs. 40-46 - Winfried E. Kühnhauser:
A Classification of Interdomain Actions. 47-61 - Stein Jørgen Ryan:
Synchronization in Portable Device Drivers. 62-69 - Xiaohui Wei, Jiubin Ju:
SFT: A Consistent Checkpointing Algorithm With Shorter Freezing Time. 70-76 - Steven Robbins:
Introducing Empirical Investigation in Undergraduate Operating Systems. 77-80
Volume 32, Number 5, December 1998
- Dileep Bhandarkar, Anant Agarwal:
ASPLOS-VIII Proceedings of the 8th International Conference on Architectural Support for Programming Languages and Operating Systems, San Jose, California, USA, October 3-7, 1998. ACM Press 1998, ISBN 1-58113-107-0 [contents]

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.