default search action
ACM Transactions on Computer Systems (TOCS), Volume 1
Volume 1, Number 1, February 1983
- David P. Reed:
Implementing Atomic Actions on Decentralized Data. 3-23 - Douglas W. Clark:
Cache Performance in the VAX-11/780. 24-37 - Adi Shamir:
On the Generation of Cryptographically Strong Pseudorandom Sequences. 38-44 - George W. Cox, William M. Corwin, Konrad K. Lai, Fred J. Pollack:
Interprocess Communication and Processor Dispatching on the Intel 432. 45-66 - Charles H. Sauer:
Computational Algorithms for State-Dependent Queueing Networks. 67-92
Volume 1, Number 2, May 1983
- Derek L. Eager, Kenneth C. Sevcik:
Performance Bound Hierarchies for Queueing Networks. 99-115 - Subhash C. Agrawal, Jeffrey P. Buzen:
The Aggregate Server Method for Analyzing Serialization Delays in Computer System. 116-143 - K. Mani Chandy, Jayadev Misra, Laura M. Haas:
Distributed Deadlock Detection. 144-156 - Peter R. Cappello, Kenneth Steiglitz:
A VLSI Layout for a Pipelined Dadda Multiplier. 157-174 - Manuel Blum:
How to Exchange (Secret) Keys. 175-193
Volume 1, Number 3, August 1983
- Tsutomu Hoshino, Toshio Kawai, Tomonori Shirakawa, Jun'ichi Higashino, Akira Yamaoka, Hachidai Ito, Takashi Sato, Kazuo Sawada:
PACS: A Parallel Microprocessor Array for Scientific Calculations. 195-221 - Richard D. Schlichting, Fred B. Schneider:
Fail-Stop Processors: An Approach to Designing Fault-Tolerant Computing Systems. 222-238 - Selim G. Akl, Peter D. Taylor:
Cryptographic Solution to a Problem of Access Control in a Hierarchy. 239-248 - R. Kenneth Bauer, Thomas A. Berson, Richard J. Feiertag:
A Key Distribution Protocol Using Event Markers. 249-255 - Richard A. Kemmerer:
Shared Resource Matrix Methodology: An Approach to Identifying Storage and Timing Channels. 256-277
Volume 1, Number 4, November 1983
- William D. Strecker:
Transient Behavior of Cache Memories. 281-293 - Hiroshi Kobayashi, Mario Gerla:
Optimal Routing in Closed Queuing Networks. 294-310 - Lansing Sloan:
Mechanisms that Enforce Bounds on Packet Lifetimes. 311-330 - A. Udaya Shankar, Simon S. Lam:
An HDLC Protocol Specification and Its Verification Using Image Protocols. 331-368
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.