default search action
Operating Systems Review, Volume 35, 2001
Volume 35, Number 1, January 2001
- Valérie Issarny:
Upcoming Events in Operating System Research. 1-5 - Dongyao Ji, Yuming Wang:
Comments on "An approach to the formal verification of the two-party cryptographic protocols" by Zhang, Li and Xiao. 6-7 - Bruce K. Haddon:
IEEE Storage System Standards. 8-16 - Ming-Yuan Zhu, Lei Luo, Guang-Zhe Xiong:
A Provably Correct Operating System: delta-Core. 17-33 - D. Janaki Ram, M. Uma Mahesh, N. S. K. Chandra Sekhar, Chitra Babu:
Causal Consistency in Mobile Environment. 34-40 - Chun-Li Lin, Hung-Min Sun, Tzonelih Hwang:
Efficient and Practical DHEKE Protocols. 41-47 - Daniel P. Bovet, Marco Cesati:
A Real Bottom-Up Operatiing Systems Course. 48-60 - Herman Chung-Hwa Rao, Yih-Farn Chen, Ming-Feng Chen:
A Proxy-Based Personal Web Archiving Service. 61-72 - Alberto Montresor, Renzo Davoli, Özalp Babaoglu:
Middleware for Dependable Network Services in Partitionable Distributed Systems. 73-84 - Maurice Herlihy, Srikanta Tirthapura, Roger Wattenhofer:
Ordered Multicast and Distributed Swap. 85-96
Volume 35, Number 2, April 2001
- Valérie Issarny:
Upcoming Events in Operating System Research. 1-6 - Greg Eisenhauer, Fabián E. Bustamante, Karsten Schwan:
A Middleware Toolkit for Client-Initiated Service Specialization. 7-20 - Ahmed Al-Theneyan, Piyush Mehrotra, Mohammad Zubair:
Enhancing Jini for Use Across Non-Multicastable Networks. 21-30 - Radu Litiu, Atul Prakash:
DACIA: A Mobile Component Framework for Buildinh Adaptive Distributed Applications. 31-42 - Yuqing Zhang, Chunling Wang, Jianping Wu, Xing Li:
Using SMV for Cryptographic Protocol Analysis: A Case Study. 43-50 - Zhiyi Huang, Chengzheng Sun, Martin K. Purvis, Stephen Cranefield:
View-based Consistency and False Sharing Effect in Distributed Shared Memory. 51-60 - Athena Vakali, Evimaria Terzi:
Multimedia Data Storage and Representation Issues on Tertiary Storage Subssystems: An Overview. 61-77 - Youhui Zhang, Dongsheng Wang, Weimin Zheng:
Transparent Checkpointing and Rollback Recovery Mechanism for Windows NT Applications. 78-85 - M. Bozyigit, M. Wasiq:
User-Level Process Checkpoint and Restore for Migration. 86-96
Volume 35, Number 3, July 2001
- Henry M. Levy:
Call for Nominations - ACM SIGOPS Mark Weiser Award. 1 - Valérie Issarny:
Upcoming Events in Operating System Research. 2-5 - Jason Crampton, George Loizou:
Authorisation and antichains. 6-15 - Alok Shriram, Anuraag Sarangi, Avinash Shankar:
ICHU Model For Processor Allocation In Distributed Operating Systems. 16-21 - Ming-Yuan Zhu, Lei Luo, Guang-Zhe Xiong:
The Minimal Model of Operating Systems. 22-29 - Bu-Sung Lee, Wentong Cai, Stephen John Turner, Jit-Beng Koh:
Comparison of Network Protocol and Architecture for Distributed Virtual Simulation Environment. 30-42 - Vijay Gupta:
A Distributed Backoff Algorithm to support real-time traffic on Ethernet. 43-54 - Bidyut Gupta, Samir K. Banerjee:
A Roll-Forward Recovery Scheme for Solving the Problem of Coasting Forward for Distributed Systems. 55-66 - Jun Wen, Xiang-liang Li:
Realize Network subsystem QoS gurantee. 67-71
Volume 35, Number 4, October 2001
- Valérie Issarny:
Upcoming Events in Operating Systems Research. 1-5 - Gregory Saunders, Michael Hitchens, Vijay Varadharajan:
Role-Based Access Control and the Access Control Matrix. 6-20 - Dan Oestreicher:
Experience With a Commercial Java Implementation of Group Communication using Reliable Multicast. 21-31 - Chang-Seop Park, Dong Hoon Lee:
Secure and Efficient Key Management for Dynamic Multicast Groups. 32-38 - Yuhong Li, Lars C. Wolf:
Collection of Network Information in Active Networks. 39-49 - Constantinos Dovrolis, Brad Thayer, Parameswaran Ramanathan:
HIP: Hybrid Interrupt-Polling for the Network Interface. 50-60 - Sukanya Suranauwarat, Hideo Taniguchi:
The Design, Implementation and Initial Evaluation of an Advanced Knowledge-based Process Scheduler. 61-81 - Tao Huang, Teng Xu, Xianliang Lu:
A High Resolution Disk I/O Trace System. 82-87 - Stefan Ludwig, Winfried Kalfa:
File System Encryption with Integrated User Management. 88-93 - Dawu Gu, Wang Yi:
On the Techniques of Enhancing the Security of Block Ciphers. 94-96
Volume 35, Number 5, December 2001
- Keith Marzullo, Mahadev Satyanarayanan:
Proceedings of the 18th ACM Symposium on Operating System Principles, SOSP 2001, Chateau Lake Louise, Banff, Alberta, Canada, October 21-24, 2001. ACM 2001, ISBN 1-58113-389-8 [contents]
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.