default search action
Andrew S. Tanenbaum
Person information
- affiliation: VU University Amsterdam, Netherlands
- award (2007): IEEE James H. Mulligan, Jr. Education Medal
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2017
- [j80]Cristiano Giuffrida, Calin Iorgulescu, Giordano Tamburrelli, Andrew S. Tanenbaum:
Automating Live Update for Generic Server Programs. IEEE Trans. Software Eng. 43(3): 207-225 (2017) - 2016
- [j79]Andrew S. Tanenbaum:
Lessons learned from 30 years of MINIX. Commun. ACM 59(3): 70-78 (2016) - [j78]Maarten van Steen, Andrew S. Tanenbaum:
A brief introduction to distributed systems. Computing 98(10): 967-1009 (2016) - [j77]Erik van der Kouwe, Cristiano Giuffrida, Andrew S. Tanenbaum:
Finding fault with fault injection: an empirical exploration of distortion in fault injection experiments. Softw. Qual. J. 24(1): 7-36 (2016) - [c102]Tomás Hrubý, Cristiano Giuffrida, Lionel Sambuc, Herbert Bos, Andrew S. Tanenbaum:
A NEaT Design for Reliable and Scalable Network Stacks. CoNEXT 2016: 359-373 - [c101]Koustubha Bhat, Dirk Vogt, Erik van der Kouwe, Ben Gras, Lionel Sambuc, Andrew S. Tanenbaum, Herbert Bos, Cristiano Giuffrida:
OSIRIS: Efficient and Consistent Recovery of Compartmentalized Operating Systems. DSN 2016: 25-36 - [c100]Erik van der Kouwe, Andrew S. Tanenbaum:
HSFI: Accurate Fault Injection Scalable to Large Code Bases. DSN 2016: 144-155 - [c99]Armando Miraglia, Dirk Vogt, Herbert Bos, Andy Tanenbaum, Cristiano Giuffrida:
Peeking into the Past: Efficient Checkpoint-Assisted Time-Traveling Debugging. ISSRE 2016: 455-466 - 2015
- [c98]Dirk Vogt, Cristiano Giuffrida, Herbert Bos, Andrew S. Tanenbaum:
Lightweight Memory Checkpointing. DSN 2015: 474-484 - [c97]Erik van der Kouwe, Cristiano Giuffrida, Razvan Ghituletez, Andrew S. Tanenbaum:
A Methodology to Efficiently Compare Operating System Stability. HASE 2015: 93-100 - [c96]Dirk Vogt, Armando Miraglia, Georgios Portokalidis, Herbert Bos, Andy Tanenbaum, Cristiano Giuffrida:
Speculative Memory Checkpointing. Middleware 2015: 197-209 - 2014
- [j76]Dirk Vogt, Cristiano Giuffrida, Herbert Bos, Andrew S. Tanenbaum:
Techniques for efficient in-memory checkpointing. ACM SIGOPS Oper. Syst. Rev. 48(1): 21-25 (2014) - [c95]Erik van der Kouwe, Cristiano Giuffrida, Andrew S. Tanenbaum:
On the Soundness of Silence: Investigating Silent Failures Using Fault Injection Experiments. EDCC 2014: 118-129 - [c94]Erik van der Kouwe, Cristiano Giuffrida, Andrew S. Tanenbaum:
Evaluating Distortion in Fault Injection Experiments. HASE 2014: 25-32 - [c93]David C. van Moolenbroek, Raja Appuswamy, Andrew S. Tanenbaum:
Putting the Pieces Together: The Construction of a Reliable Virtualizing Object-Based Storage Stack. CANDAR 2014: 76-85 - [c92]Cristiano Giuffrida, Calin Iorgulescu, Andrew S. Tanenbaum:
Mutable checkpoint-restart: automating live update for generic server programs. Middleware 2014: 133-144 - [c91]Tomás Hrubý, Teodor Crivat, Herbert Bos, Andrew S. Tanenbaum:
On Sockets and System Calls: Minimizing Context Switches for the Socket API. TRIOS 2014 - [c90]David C. van Moolenbroek, Raja Appuswamy, Andrew S. Tanenbaum:
Towards a Flexible, Lightweight Virtualization Alternative. SYSTOR 2014: 8:1-8:7 - 2013
- [c89]Cristiano Giuffrida, Anton Kuijsten, Andrew S. Tanenbaum:
Safe and automatic live update for operating systems. ASPLOS 2013: 279-292 - [c88]Cristiano Giuffrida, Lorenzo Cavallaro, Andrew S. Tanenbaum:
Practical automated vulnerability monitoring using program state invariants. DSN 2013: 1-12 - [c87]Dirk Vogt, Cristiano Giuffrida, Herbert Bos, Andrew S. Tanenbaum:
Techniques for efficient in-memory checkpointing. HotDep 2013: 12:1-12:5 - [c86]Raja Appuswamy, David C. van Moolenbroek, Sharan Santhanam, Andrew S. Tanenbaum:
File-Level, Host-Side Flash Caching with Loris. ICPADS 2013: 34-42 - [c85]David C. van Moolenbroek, Raja Appuswamy, Andrew S. Tanenbaum:
Battling Bad Bits with Checksums in the Loris Page Cache. LADC 2013: 68-77 - [c84]Cristiano Giuffrida, Calin Iorgulescu, Anton Kuijsten, Andrew S. Tanenbaum:
Back to the Future: Fault-tolerant Live Update with Time-traveling State Transfer. LISA 2013: 89-104 - [c83]Raja Appuswamy, David C. van Moolenbroek, Andrew S. Tanenbaum:
Cache, cache everywhere, flushing all hits down the sink: On exclusivity in multilevel, hybrid caches. MSST 2013: 1-14 - [c82]Cristiano Giuffrida, Anton Kuijsten, Andrew S. Tanenbaum:
EDFI: A Dependable Fault Injection Tool for Dependability Benchmarking Experiments. PRDC 2013: 31-40 - [c81]David C. van Moolenbroek, Raja Appuswamy, Andrew S. Tanenbaum:
Transaction-Based Process Crash Recovery of File System Namespace Modules. PRDC 2013: 338-347 - [c80]Tomás Hrubý, Herbert Bos, Andrew S. Tanenbaum:
When Slower Is Faster: On Heterogeneous Multicores for Reliable Systems. USENIX ATC 2013: 255-266 - 2012
- [c79]Tomás Hrubý, Dirk Vogt, Herbert Bos, Andrew S. Tanenbaum:
Keep net working - on a dependable and fast networking stack. DSN 2012: 1-12 - [c78]Cristiano Giuffrida, Andrew S. Tanenbaum:
Safe and automated state transfer for secure and reliable live update. HotSWUp 2012: 16-20 - [c77]Raja Appuswamy, David C. van Moolenbroek, Andrew S. Tanenbaum:
Integrating flash-based SSDs into the storage stack. MSST 2012: 1-12 - [c76]David C. van Moolenbroek, Raja Appuswamy, Andrew S. Tanenbaum:
Integrated System and Process Crash Recovery in the Loris Storage Stack. NAS 2012: 1-10 - [c75]Cristiano Giuffrida, Anton Kuijsten, Andrew S. Tanenbaum:
Enhanced Operating System Security Through Efficient and Fine-grained Address Space Randomization. USENIX Security Symposium 2012: 475-490 - [e2]R. Chandrasekhar, Andrew S. Tanenbaum, P. Venkat Rangan:
First International Conference on Security of Internet of Things, SECURIT '12, Kollam, India - August 17 - 19, 2012. ACM 2012, ISBN 978-1-4503-1822-8 [contents] - 2011
- [b27]Andrew S. Tanenbaum, David Wetherall:
Computer networks, 5th Edition. Pearson 2011, ISBN 0132553171, pp. 1-951 - [c74]Herbert Bos, Lorenzo Cavallaro, Andrew S. Tanenbaum:
Systems Security at VU University Amsterdam. SysSec@DIMVA 2011: 111-114 - [c73]David C. van Moolenbroek, Raja Appuswamy, Andrew S. Tanenbaum:
Integrated end-to-end dependability in the Loris storage stack. DSN Workshops 2011: 165-170 - [c72]Raja Appuswamy, David C. van Moolenbroek, Andrew S. Tanenbaum:
Flexible, modular file volume virtualization in Loris. MSST 2011: 1-14 - [c71]Richard van Heuven van Staereling, Raja Appuswamy, David C. van Moolenbroek, Andrew S. Tanenbaum:
Efficient, Modular Metadata Management with Loris. NAS 2011: 278-287 - 2010
- [j75]Aikaterini Mitrokotsa, Melanie R. Rieback, Andrew S. Tanenbaum:
Classifying RFID attacks and defenses. Inf. Syst. Frontiers 12(5): 491-505 (2010) - [j74]Andrew S. Tanenbaum, Raja Appuswamy, Herbert Bos, Lorenzo Cavallaro, Cristiano Giuffrida, Tomás Hrubý, Jorrit N. Herder, Erik van der Kouwe, David C. van Moolenbroek:
MINIX 3: Status Report and Current Research. login Usenix Mag. 35(3) (2010) - [c70]Cristiano Giuffrida, Lorenzo Cavallaro, Andrew S. Tanenbaum:
We Crashed, Now What? HotDep 2010 - [c69]Raja Appuswamy, David C. van Moolenbroek, Andrew S. Tanenbaum:
Block-level RAID Is Dead. HotStorage 2010 - [c68]Raja Appuswamy, David C. van Moolenbroek, Andrew S. Tanenbaum:
Loris - A Dependable, Modular File-Based Storage Stack. PRDC 2010: 165-174
2000 – 2009
- 2009
- [b26]Andrew S. Tanenbaum:
Moderne Betriebssysteme, 3. Auflage. Pearson Studium 2009, ISBN 978-3-8273-7342-7, pp. 1-1239 - [b25]Andrew S. Tanenbaum:
Modern operating systems, 3rd Edition. Pearson Prentice-Hall 2009, ISBN 0138134596, pp. I-XXVII, 1-1072 - [j73]Nathanael Paul, Andrew S. Tanenbaum:
Trustworthy Voting: From Machine to System. Computer 42(5): 23-29 (2009) - [j72]Guido van 't Noordende, Benno J. Overeinder, Reinier J. Timmer, Frances M. T. Brazier, Andrew S. Tanenbaum:
Constructing secure mobile agent systems using the agent operating system. Int. J. Intell. Inf. Database Syst. 3(4): 363-381 (2009) - [j71]Antonio Mancina, Dario Faggioli, Giuseppe Lipari, Jorrit N. Herder, Ben Gras, Andrew S. Tanenbaum:
Enhancing a dependable multiserver operating system with temporal protection via resource reservations. Real Time Syst. 43(2): 177-210 (2009) - [c67]Nathanael Paul, Andrew S. Tanenbaum:
The Design of a Trustworthy Voting System. ACSAC 2009: 507-517 - [c66]Jorrit N. Herder, Herbert Bos, Ben Gras, Philip Homburg, Andrew S. Tanenbaum:
Fault isolation for device drivers. DSN 2009: 33-42 - [c65]Cristiano Giuffrida, Andrew S. Tanenbaum:
Cooperative Update: A New Model for Dependable Live Update. HotSWUp 2009 - [c64]Jorrit N. Herder, David C. van Moolenbroek, Raja Appuswamy, Bingzheng Wu, Ben Gras, Andrew S. Tanenbaum:
Dealing with Driver Failures in the Storage Stack. LADC 2009: 119-126 - 2008
- [b24]Andrew S. Tanenbaum, Maarten van Steen:
Verteilte Systeme - Prinzipien und Paradigmen, 2. Auflage. Pearson Studium 2008, pp. 1-761 - [b23]Andrew S. Tanenbaum:
Modern operating systems, 3rd Edition. Pearson Education 2008, ISBN 978-0-13-600663-3, pp. I-XXVII, 1-1076 - [j70]Srijith Krishnan Nair, Ron Gerrits, Bruno Crispo, Andrew S. Tanenbaum:
Turning Teenagers into Stores. Computer 41(2): 58-62 (2008) - [c63]Srijith Krishnan Nair, Andrew S. Tanenbaum, Gabriela Gheorghe, Bruno Crispo:
Enforcing DRM policies across applications. Digital Rights Management Workshop 2008: 87-94 - [c62]Srijith Krishnan Nair, Erik Zentveld, Bruno Crispo, Andrew S. Tanenbaum:
Floodgate: A Micropayment Incentivized P2P Content Delivery Network. ICCCN 2008: 291-297 - [c61]Aikaterini Mitrokotsa, Melanie R. Rieback, Andrew S. Tanenbaum:
Classification of RFID Attacks. IWRT 2008: 73-86 - [c60]Jorrit N. Herder, Herbert Bos, Ben Gras, Philip Homburg, Andrew S. Tanenbaum:
Countering IPC Threats in Multiserver Operating Systems (A Fundamental Requirement for Dependability). PRDC 2008: 112-121 - 2007
- [b22]Andrew S. Tanenbaum, Maarten van Steen:
Distributed systems - principles and paradigms, 2nd Edition. Pearson Education 2007, ISBN 978-0-13-239227-3, pp. I-XVIII, 1-686 - [j69]Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum, Arno Bakker:
Design and implementation of a secure wide-area object middleware. Comput. Networks 51(10): 2484-2513 (2007) - [j68]Jorrit N. Herder, Herbert Bos, Ben Gras, Philip Homburg, Andrew S. Tanenbaum:
Roadmap to a Failure-Resilient Operating System. login Usenix Mag. 32(1) (2007) - [c59]Jorrit N. Herder, Herbert Bos, Ben Gras, Philip Homburg, Andrew S. Tanenbaum:
Failure Resilience for Device Drivers. DSN 2007: 41-50 - [c58]Guido van 't Noordende, Frances M. T. Brazier, Andrew S. Tanenbaum:
Guarding security sensitive content using confined mobile agents. SAC 2007: 48-55 - [c57]Srijith Krishnan Nair, Muhammad Torabi Dashti, Bruno Crispo, Andrew S. Tanenbaum:
A Hybrid PKI-IBC Based Ephemerizer System. SEC 2007: 241-252 - [c56]Guido van 't Noordende, Ádám Balogh, Rutger F. H. Hofman, Frances M. T. Brazier, Andrew S. Tanenbaum:
A Secure Jailing System for Confining Untrusted Applications. SECRYPT 2007: 414-423 - [c55]Srijith Krishnan Nair, Patrick N. D. Simpson, Bruno Crispo, Andrew S. Tanenbaum:
A Virtual Machine Based Information Flow Control System for Policy Enforcement. REM@ESORICS 2007: 3-16 - 2006
- [b21]Andrew S. Tanenbaum:
Computerarchitektur - Strukturen, Konzepte, Grundlagen, 5th Edition. Pearson Education 2006, ISBN 978-3-8273-7151-5, pp. 1-829 - [b20]Andrew S. Tanenbaum, Albert S. Woodhull:
Operating systems - design and implementation, 3rd Edition. Pearson Education 2006, ISBN 978-0-13-142938-3, pp. I-XVII, 1-1054 - [b19]Andrew S. Tanenbaum:
Structured computer organization, 5th Edition. Pearson Education 2006, ISBN 978-0-13-148521-1, pp. I-XX, 1-771 - [j67]Andrew S. Tanenbaum, Jorrit N. Herder, Herbert Bos:
Can We Make Operating Systems Reliable and Secure? Computer 39(5): 44-51 (2006) - [j66]Andrew S. Tanenbaum, Chandana Gamage, Bruno Crispo:
Taking Sensor Networks from the Lab to the Jungle. Computer 39(8): 98-100 (2006) - [j65]Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum:
RFID malware: truth vs. myth. IEEE Secur. Priv. 4(4): 70-72 (2006) - [j64]Melanie R. Rieback, Patrick N. D. Simpson, Bruno Crispo, Andrew S. Tanenbaum:
RFID malware: Design principles and examples. Pervasive Mob. Comput. 2(4): 405-426 (2006) - [j63]Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum:
The Evolution of RFID Security. IEEE Pervasive Comput. 5(1): 62-69 (2006) - [j62]Andrew S. Tanenbaum, Jorrit N. Herder, Herbert Bos:
File size distribution on UNIX systems: then and now. ACM SIGOPS Oper. Syst. Rev. 40(1): 100-104 (2006) - [j61]Jorrit N. Herder, Herbert Bos, Ben Gras, Philip Homburg, Andrew S. Tanenbaum:
MINIX 3: a highly reliable, self-repairing operating system. ACM SIGOPS Oper. Syst. Rev. 40(3): 80-89 (2006) - [j60]Arno Bakker, Maarten van Steen, Andrew S. Tanenbaum:
A wide-area Distribution Network for free software. ACM Trans. Internet Techn. 6(3): 259-281 (2006) - [j59]Jorrit N. Herder, Herbert Bos, Ben Gras, Philip Homburg, Andrew S. Tanenbaum:
Modular System Programming in MINIX 3. login Usenix Mag. 31(2) (2006) - [c54]Jorrit N. Herder, Herbert Bos, Ben Gras, Philip Homburg, Andrew S. Tanenbaum:
Reorganizing UNIX for Reliability. Asia-Pacific Computer Systems Architecture Conference 2006: 81-94 - [c53]Jorrit N. Herder, Herbert Bos, Ben Gras, Philip Homburg, Andrew S. Tanenbaum:
Construction of a Highly Dependable Operating System. EDCC 2006: 3-12 - [c52]Chandana Gamage, Kemal Bicakci, Bruno Crispo, Andrew S. Tanenbaum:
Security for the Mythical Air-Dropped Sensor Network. ISCC 2006: 41-47 - [c51]Melanie R. Rieback, Georgi Gaydadjiev, Bruno Crispo, Rutger F. H. Hofman, Andrew S. Tanenbaum:
A Platform for RFID Security and Privacy Administration (Awarded Best Paper!). LISA 2006: 89-102 - [c50]Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum:
Is Your Cat Infected with a Computer Virus?. PerCom 2006: 169-179 - [c49]Chandana Gamage, Ben Gras, Bruno Crispo, Andrew S. Tanenbaum:
An Identity-based Ring Signature Scheme with Enhanced Privacy. SecureComm 2006: 1-5 - [c48]Srijith K. Nair, Bruno Crispo, Andrew S. Tanenbaum:
Towards a Secure Application-Semantic Aware Policy Enforcement Architecture. Security Protocols Workshop 2006: 26-31 - [i1]Kemal Bicakci, Bruno Crispo, Andrew S. Tanenbaum:
Reverse SSL: Improved Server Performance and DoS Resistance for SSL Handshakes. IACR Cryptol. ePrint Arch. 2006: 212 (2006) - 2005
- [c47]Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum:
RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management. ACISP 2005: 184-194 - [c46]Kemal Bicakci, Bruno Crispo, Andrew S. Tanenbaum:
Counting Abuses Using Flexible Off-line Credentials. ACISP 2005: 548-559 - [c45]Bogdan C. Popescu, Maarten van Steen, Bruno Crispo, Andrew S. Tanenbaum, Jan Sacha, Ihor Kuz:
Securely Replicated Web Documents. IPDPS 2005 - [c44]Kemal Bicakci, Bruno Crispo, Andrew S. Tanenbaum:
How to incorporate revocation status information into the trust metrics for public-key certification. SAC 2005: 1594-1598 - [c43]Andrew S. Tanenbaum:
Keynote speech. SOSP 2005 - [c42]Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum:
Keep on Blockin' in the Free World: Personal Access Control for Low-Cost RFID Tags. Security Protocols Workshop 2005: 51-59 - [c41]Srijith Krishnan Nair, Bogdan C. Popescu, Chandana Gamage, Bruno Crispo, Andrew S. Tanenbaum:
Enabling DRM-Preserving Digital Content Redistribution. CEC 2005: 151-158 - 2004
- [b18]Andrew S. Tanenbaum, James R. Goodman:
Computerarchitektur - Strukturen, Konzepte, Grundlagen, 4. Auflage. Pearson Studium 2004, ISBN 978-3-8273-7148-5, pp. 1-772 - [c40]Bruno Crispo, Bogdan C. Popescu, Andrew S. Tanenbaum:
Symmetric Key Authentication Services Revisited. ACISP 2004: 248-261 - [c39]Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum, Frank Kamperman:
A DRM security architecture for home networks. Digital Rights Management Workshop 2004: 1-10 - [c38]Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum:
Support for multi-level security policies in DRM architectures. NSPW 2004: 3-9 - [c37]Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum:
Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System. Security Protocols Workshop 2004: 213-220 - 2003
- [b17]Andrew S. Tanenbaum, Maarten van Steen:
Verteilte Systeme - Grundlagen und Paradigmen. Pearson Studium 2003, ISBN 978-3-8273-7057-0, pp. 1-878 - [b16]Andrew S. Tanenbaum:
Computernetzwerke, 4. Auflage. Pearson Studium 2003, ISBN 978-3-8273-7046-4, pp. 1-949 - [c36]Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum:
Secure Data Replication over Untrusted Hosts. HotOS 2003: 121-126 - [c35]Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum:
A Certificate Revocation Scheme for a Large-Scale Highly Replicated Distributed System. ISCC 2003: 225-231 - [c34]Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum, Maas Zeeman:
Enforcing Security Policies for Distributed Objects Applications. Security Protocols Workshop 2003: 119-130 - 2002
- [b15]Andrew S. Tanenbaum:
Moderne Betriebssysteme, 2. überarbeitete Auflage. Pearson Studium 2002, ISBN 978-3-8273-7019-8, pp. 1-1021 - [b14]Andrew S. Tanenbaum:
Computer networks, 4th Edition. Prentice Hall 2002, ISBN 978-0-13-038488-1, pp. I-XX, 1-891 - [j58]Guillaume Pierre, Maarten van Steen, Andrew S. Tanenbaum:
Dynamically Selecting Optimal Distribution Strategies for Web Documents. IEEE Trans. Computers 51(6): 637-651 (2002) - [c33]Bogdan C. Popescu, Maarten van Steen, Andrew S. Tanenbaum:
A Security Architecture for Object-Based Distributed Systems. ACSAC 2002: 161-171 - [c32]Bogdan C. Popescu, Chandana Gamage, Andrew S. Tanenbaum:
Access control, reverse access control and replication control in a world wide distributed system. Communications and Multimedia Security 2002: 155-167 - 2001
- [b13]Andrew S. Tanenbaum, James R. Goodman:
Computerarchitektur - Strukturen, Konzepte, Grundlagen, 4. Auflage. Pearson Studium 2001, ISBN 978-3-8273-7016-7, pp. 1-772 - [b12]Andrew S. Tanenbaum:
Modern operating systems, 2nd Edition. Prentice Hall 2001, ISBN 978-0-13-031358-4, pp. I-XXIV, 1-951 - [j57]Aline Baggio, Gerco Ballintijn, Maarten van Steen, Andrew S. Tanenbaum:
Efficient Tracking of Mobile Objects in Globe. Comput. J. 44(5): 340-353 (2001) - [j56]Guillaume Pierre, Ihor Kuz, Maarten van Steen, Andrew S. Tanenbaum:
Differentiated strategies for replicating Web documents. Comput. Commun. 24(2): 232-240 (2001) - [j55]M. Jansen, E. Klaver, Patrick Verkaik, Maarten van Steen, Andrew S. Tanenbaum:
Encapsulating distribution by remote objects. Inf. Softw. Technol. 43(6): 353-363 (2001) - [j54]Gerco Ballintijn, Maarten van Steen, Andrew S. Tanenbaum:
Scalable Human-Friendly Resource Names. IEEE Internet Comput. 5(5): 20-27 (2001) - [c31]Guido van 't Noordende, Frances M. T. Brazier, Andrew S. Tanenbaum, Maarten van Steen:
Mansion, A Distributed Multi-Agent System. HotOS 2001: 183 - [c30]Arno Bakker, Maarten van Steen, Andrew S. Tanenbaum:
A Law-Abiding Peer-to-Peer Network for Free-Software Distribution. NCA 2001: 60-67 - 2000
- [b11]Andrew S. Tanenbaum:
Computernetzwerke, 3. Auflage. Pearson Studium 2000, ISBN 978-3-8273-7011-2, pp. 1-873 - [j53]Henri E. Bal, Raoul Bhoedjang, Rutger F. H. Hofman, Ceriel J. H. Jacobs, Thilo Kielmann, Jason Maassen, Rob van Nieuwpoort, John Romain, Luc Renambot, Tim Rühl, Ronald Veldema, Kees Verstoep, Aline Baggio, Gerco Ballintijn, Ihor Kuz, Guillaume Pierre, Maarten van Steen, Andrew S. Tanenbaum, Gerben Doornbos, Desmond Germans, Hans J. W. Spoelder, Evert Jan Baerends, Stan J. A. van Gisbergen, Hamid Afsermanseh, G. Dick van Albada, Adam Belloum, David Dubbeldam, Zeger W. Hendrikse, Louis O. Hertzberger, Alfons G. Hoekstra, Kamil Iskra, Drona Kandhai, Dennis C. Koelma, Frank van der Linden, Benno J. Overeinder, Peter M. A. Sloot, Piero Spinnato, Dick H. J. Epema, Arjan J. C. van Gemund, Pieter P. Jonker, Andrei Radulescu, Kees van Reeuwijk, Henk J. Sips, Peter M. W. Knijnenburg, Michael S. Lew, Floris Sluiter, Lex Wolters, Hans Blom, Cees de Laat:
The Distributed ASCI Supercomputer Project. ACM SIGOPS Oper. Syst. Rev. 34(4): 76-96 (2000) - [c29]Jussipekka Leiwo, Christoph Hänle, Philip Homburg, Andrew S. Tanenbaum:
Disallowing Unauthorized State Changes of Distributed Shared Objects. SEC 2000: 381-390 - [c28]Arno Bakker, E. Amade, Gerco Ballintijn, Ihor Kuz, Patrick Verkaik, I. van der Wijk, Maarten van Steen, Andrew S. Tanenbaum:
The Globe Distribution Network. USENIX ATC, FREENIX Track 2000: 141-152
1990 – 1999
- 1999
- [j52]Maarten van Steen, Andrew S. Tanenbaum, Ihor Kuz, Henk J. Sips:
A scalable middleware solution for advanced wide-area Web services. Distributed Syst. Eng. 6(1): 34-42 (1999) - [j51]Maarten van Steen, Philip Homburg, Andrew S. Tanenbaum:
Globe: a wide area distributed system. IEEE Concurr. 7(1): 70-78 (1999) - [c27]Arno Bakker, Maarten van Steen, Andrew S. Tanenbaum:
From Remote Objects to Physically Distributed Objects. FTDCS 1999: 47-52 - [c26]Jussipekka Leiwo, Christoph Hänle, Philip Homburg, Chandana Gamage, Andrew S. Tanenbaum:
A Security Design for a Wide-Area Distributed System. ICISC 1999: 236-256 - 1998
- [j50]Maarten van Steen, Franz J. Hauck, Gerco Ballintijn, Andrew S. Tanenbaum:
Algorithmic Design of the Globe Wide-Area Location Service. Comput. J. 41(5): 297-310 (1998) - [j49]Maarten van Steen, Franz J. Hauck, Philip Homburg, Andrew S. Tanenbaum:
Locating objects in wide-area systems. IEEE Commun. Mag. 36(1): 104-109 (1998) - [c25]Anne-Marie Kermarrec, Ihor Kuz, Maarten van Steen, Andrew S. Tanenbaum:
A Framework for Consistent, Replicated Web Objects. ICDCS 1998: 276-291 - [c24]Arno Bakker, Maarten van Steen, Andrew S. Tanenbaum:
Replicated invocations in wide-area systems. ACM SIGOPS European Workshop 1998: 130-137 - 1997
- [j48]Saniya Ben Hassen, Henri E. Bal, Andrew S. Tanenbaum:
Hawk: a Runtime System for Partitioned Objects*. Parallel Algorithms Appl. 12(1-3): 205-230 (1997) - [j47]Andrew S. Tanenbaum:
Report on the Seventh ACM SIGOPS European Workshop. ACM SIGOPS Oper. Syst. Rev. 31(1): 5-17 (1997) - 1996
- [b10]Andrew S. Tanenbaum:
Computer Networks, 3rd Edition. Prentice-Hall international editions, Prentice Hall 1996, ISBN 978-0-13-349945-2, pp. I-XVII, 1-813 - [c23]M. Frans Kaashoek, Andrew S. Tanenbaum:
An Evaluation of the Amoeba Group Communication System. ICDCS 1996: 436-448 - [c22]Philip Homburg, Maarten van Steen, Andrew S. Tanenbaum:
An architecture for a wide area distributed system. ACM SIGOPS European Workshop 1996: 75-82 - [e1]Andrew Herbert, Andrew S. Tanenbaum:
Proceedings of the 7th ACM SIGOPS European Workshop: Systems Support for Worldwide Applications, 1996, Connemara, Ireland, September 9-11, 1996. ACM 1996 [contents] - 1995
- [b9]Andrew S. Tanenbaum:
Verteilte Betriebssysteme. Prentice Hall 1995, ISBN 978-3-930436-23-1, pp. 1-794 - [b8]Andrew S. Tanenbaum:
Distributed operating systems. Prentice Hall 1995, ISBN 978-0-13-143934-4, pp. I-XVII, 1-614 - [b7]Andrew S. Tanenbaum:
Moderne Betriebssysteme, 2. Auflage. Hanser Studien-Bücher der Informatik, Hanser 1995, ISBN 978-3-446-18402-2, pp. I-XXI, 1-877 - [j46]Andrew S. Tanenbaum:
A comparison of three microkernels. J. Supercomput. 9(1-2): 7-22 (1995) - [c21]Leendert van Doorn, Philip Homburg, Andrew S. Tanenbaum:
Paramecium: an extensible object-based kernel. HotOS 1995: 86-89 - 1994
- [j45]Andrew S. Tanenbaum, Henri E. Bal, Saniya Ben Hassen, M. Frans Kaashoek:
Object-based approach to programming distributed systems. Concurr. Pract. Exp. 6(4): 235-249 (1994) - [c20]Leendert van Doorn, Andrew S. Tanenbaum:
Using Active Messages to Support Shared Objects. ACM SIGOPS European Workshop 1994: 112-116 - 1993
- [j44]Andrew S. Tanenbaum:
Distributed operating systems anno 1992. What have we learned so far? Distributed Syst. Eng. 1(1): 3-10 (1993) - [j43]M. Frans Kaashoek, Andrew S. Tanenbaum, Kees Verstoep:
Group communication in Amoeba and its applications. Distributed Syst. Eng. 1(1): 48- (1993) - [j42]M. Frans Kaashoek, Robbert van Renesse, Hans van Staveren, Andrew S. Tanenbaum:
FLIP: An Internetwork Protocol for Supporting Distributed Systems. ACM Trans. Comput. Syst. 11(1): 73-106 (1993) - [c19]Andrew S. Tanenbaum, Henri E. Bal, M. Frans Kaashoek:
Programming a Distributed System Using Shared Objects. HPDC 1993: 5-12 - [c18]Howard Jay Siegel, Henry G. Dietz, Richard F. Freund, Chani Pangali, Richard C. Metzger, Kenneth W. Neves, C. V. Ramamoorthy, Andrew S. Tanenbaum:
Panel - The Virtual Heterogeneous Supercomputer: Can It Be Built? HPDC 1993: 30-31 - [c17]M. Frans Kaashoek, Andrew S. Tanenbaum, Kees Verstoep:
Using Group Communication to Implement a Fault-Tolerant Directory Service. ICDCS 1993: 130-139 - 1992
- [b6]Andrew S. Tanenbaum:
Computer-Netzwerke. Wolfram's Anwender- und Programmierhandbücher, Wolfram's Verlag 1992, ISBN 978-3-925328-79-4, pp. I-XX, 1-801 - [b5]Andrew S. Tanenbaum:
Modern Operating Systems. Prentice-Hall 1992, ISBN 0-13-588187-0 - [j41]Andrew S. Tanenbaum, M. Frans Kaashoek, Henri E. Bal:
Parallel Programming Using Shared Objects and Broadcasting. Computer 25(8): 10-19 (1992) - [j40]Henri E. Bal, M. Frans Kaashoek, Andrew S. Tanenbaum, Jack Jansen:
Replication techniques for speeding up parallel applications on distributed systems. Concurr. Pract. Exp. 4(5): 337-355 (1992) - [j39]M. Frans Kaashoek, Robbert van Renesse, Hans van Staveren, Andrew S. Tanenbaum:
FLIP; an Internetwork Protocol for Supporting Distributed Systems (Abstract). ACM SIGOPS Oper. Syst. Rev. 26(2): 29 (1992) - [j38]M. Frans Kaashoek, Henri E. Bal, Andrew S. Tanenbaum:
A Comparison of Two Paradigms for Distributed Shared Memory. Softw. Pract. Exp. 22(11): 985-1010 (1992) - [j37]Henri E. Bal, M. Frans Kaashoek, Andrew S. Tanenbaum:
Orca: A Language For Parallel Programming of Distributed Systems. IEEE Trans. Software Eng. 18(3): 190-205 (1992) - [c16]M. Frans Kaashoek, Andrew S. Tanenbaum, Kees Verstoep:
An experimental comparison of remote procedure call and group communication. ACM SIGOPS European Workshop 1992 - 1991
- [j36]Henri E. Bal, Andrew S. Tanenbaum:
Distributed Programming with Shared Data. Comput. Lang. 16(2): 129-146 (1991) - [j35]Andrew S. Tanenbaum, M. Frans Kaashoek, Robbert van Renesse, Henri E. Bal:
The Amoeba distributed operating system - A status report. Comput. Commun. 14(6): 324-335 (1991) - [j34]Fred Douglis, John K. Ousterhout, M. Frans Kaashoek, Andrew S. Tanenbaum:
A Comparison of Two Distributed Systems: Amoeba and Sprite. Comput. Syst. 4(4): 353-384 (1991) - [j33]M. Frans Kaashoek, Andrew S. Tanenbaum:
Fault Tolerance Using Group Communication. ACM SIGOPS Oper. Syst. Rev. 25(2): 71-74 (1991) - [c15]M. Frans Kaashoek, Andrew S. Tanenbaum:
Group communication in the Amoeba distributed operating system. ICDCS 1991: 222-230 - 1990
- [b4]Andrew S. Tanenbaum:
Structured computer organization, 3rd Edition. Prentice Hall 1990, ISBN 978-0-13-852872-0, pp. I-XVII, 1-587 - [j32]Andrew S. Tanenbaum, Robbert van Renesse, Hans van Staveren, Gregory J. Sharp, Sape J. Mullender:
Experiences with the Amoeba Distributed Operating System. Commun. ACM 33(12): 46-63 (1990) - [j31]Sape J. Mullender, Guido van Rossum, Andrew S. Tanenbaum, Robbert van Renesse, Hans van Staveren:
Amoeba: A Distributed Operating System for the 1990s. Computer 23(5): 44-53 (1990) - [j30]Henri E. Bal, Andrew S. Tanenbaum, M. Frans Kaashoek:
Orca: a language for distributed programming. ACM SIGPLAN Notices 25(5): 17-24 (1990) - [c14]Henri E. Bal, M. Frans Kaashoek, Andrew S. Tanenbaum:
Experience with Distributed Programming in ORCA. ICCL 1990: 79-89 - [c13]M. Frans Kaashoek, Andrew S. Tanenbaum:
Fault tolerance using group communication. ACM SIGOPS European Workshop 1990
1980 – 1989
- 1989
- [j29]Henri E. Bal, Jennifer G. Steiner, Andrew S. Tanenbaum:
Programming Languages for Distributed Computing Systems. ACM Comput. Surv. 21(3): 261-322 (1989) - [j28]M. Frans Kaashoek, Andrew S. Tanenbaum, Susan Flynn Hummel, Henri E. Bal:
An Efficient Reliable Broadcast Protocol. ACM SIGOPS Oper. Syst. Rev. 23(4): 5-19 (1989) - [j27]Andrew S. Tanenbaum, M. Frans Kaashoek, Koen Langendoen, Ceriel J. H. Jacobs:
The design of very fast portable compilers. ACM SIGPLAN Notices 24(11): 125-131 (1989) - [j26]Robbert van Renesse, Hans van Staveren, Andrew S. Tanenbaum:
The Performance of the Amoeba Distributed Operating system. Softw. Pract. Exp. 19(3): 223-234 (1989) - [c12]Robbert van Renesse, Andrew S. Tanenbaum, Annita N. Wilschut:
The Design of a High-Performance File Server. ICDCS 1989: 22-27 - [c11]Robbert van Renesse, Andrew S. Tanenbaum, Sape J. Mullender:
The Evolution of a Distributed Operating System. Process in Distributed Operating Systems and Distributed Systems Management 1989: 1-12 - [c10]Erik H. Baalbergen, Kees Verstoep, Andrew S. Tanenbaum:
On the Design of the Amoeba Configuration Manager. SCM 1989: 15-22 - 1988
- [b3]Andrew S. Tanenbaum:
Computer Networks, Second Edition. Prentice Hall 1988, ISBN 978-0-13-166836-2, pp. I-XV, 1-658 - [j25]Robbert van Renesse, Hans van Staveren, Andrew S. Tanenbaum:
Performance of the World's Fastest Distributed Operating System. ACM SIGOPS Oper. Syst. Rev. 22(4): 25-34 (1988) - [c9]Henri E. Bal, Andrew S. Tanenbaum:
Distributed programming with shared data. ICCL 1988: 82-91 - [c8]Robbert van Renesse, Andrew S. Tanenbaum:
Voting with Ghosts. ICDCS 1988: 456-462 - [c7]Robbert van Renesse, Andrew S. Tanenbaum, Gregory J. Sharp:
Functional specialization in distributed operating systems. ACM SIGOPS European Workshop 1988 - 1987
- [b2]Andrew S. Tanenbaum:
Operating systems: design and implementation. Prentice-Hall software series, Prentice-Hall 1987, ISBN 0136373313, pp. I-XVI, 1-719 - [j24]Andrew S. Tanenbaum:
A Unic Clone with Source Code for Operating Systems Courses. ACM SIGOPS Oper. Syst. Rev. 21(1): 20-29 (1987) - [j23]Wiebren de Jonge, Andrew S. Tanenbaum, Reind P. van de Riet:
Two Access Methods Using Compact Binary Trees. IEEE Trans. Software Eng. 13(7): 799-810 (1987) - [c6]Robbert van Renesse, Andrew S. Tanenbaum, Hans van Staveren, J. Hall:
Connecting RPC-Based Distributed Systems Using Wide-Area Networks. ICDCS 1987: 28-34 - [c5]Andrew S. Tanenbaum, Robbert van Renesse:
Reliability Issues in Distributed Operating Systems. SRDS 1987: 3-11 - 1986
- [j22]Sape J. Mullender, Andrew S. Tanenbaum:
The Design of a Capability-Based Distributed Operating System. Comput. J. 29(4): 289-299 (1986) - [j21]Henri E. Bal, Andrew S. Tanenbaum:
Language- and Machine-Independent Global Optimization on Intermediate Code. Comput. Lang. 11(2): 105-121 (1986) - [c4]Andrew S. Tanenbaum, Sape J. Mullender, Robbert van Renesse:
Using Sparse Capabilities in a Distributed Operating System. ICDCS 1986: 558-563 - [c3]Andrew S. Tanenbaum, Robbert van Renesse:
Making distributed systems palatable. ACM SIGOPS European Workshop 1986 - 1985
- [j20]Andrew S. Tanenbaum, Robbert van Renesse:
Distributed Operating Systems. ACM Comput. Surv. 17(4): 419-470 (1985) - [c2]Sape J. Mullender, Andrew S. Tanenbaum:
A Distributed File Service Based on Optimistic Concurrency Control. SOSP 1985: 51-62 - 1984
- [j19]Sape J. Mullender, Andrew S. Tanenbaum:
Protection and Resource Control in Distributed Operating Systems. Comput. Networks 8: 421-432 (1984) - [j18]Andrew S. Tanenbaum, Ed Keizer, Hans van Staveren:
Does anybody out there want to write HALF of a compiler? ACM SIGPLAN Notices 19(8): 106-108 (1984) - [j17]Sape J. Mullender, Andrew S. Tanenbaum:
Immediate Files. Softw. Pract. Exp. 14(4): 365-368 (1984) - 1983
- [j16]Andrew S. Tanenbaum, Hans van Staveren, E. G. Keizer, Johan W. Stevenson:
A Practicel Tool Kit for Making Portable Compilers. Commun. ACM 26(9): 654-660 (1983) - 1982
- [j15]Andrew S. Tanenbaum, Hans van Staveren, Johan W. Stevenson:
Using Peephole Optimization on Intermediate Code. ACM Trans. Program. Lang. Syst. 4(1): 21-36 (1982) - [c1]Andrew S. Tanenbaum, Sape J. Mullender:
Operating System Requirements for Distributed Data Base Systems. DDB 1982: 105-114 - 1981
- [b1]Andrew S. Tanenbaum:
Computer Networks. Prentice-Hall 1981, ISBN 0-13-165183-8 - [j14]Andrew S. Tanenbaum:
Network Protocols. ACM Comput. Surv. 13(4): 453-489 (1981) - [j13]Andrew S. Tanenbaum, Sape J. Mullender:
An Overview of the Amoeba Distributed Operating System. ACM SIGOPS Oper. Syst. Rev. 15(3): 51-64 (1981)
1970 – 1979
- 1979
- [j12]Johan W. Stevenson, Andrew S. Tanenbaum:
Efficient encoding of machine instructions. SIGARCH Comput. Archit. News 7(8): 10-17 (1979) - [j11]Andrew S. Tanenbaum:
A Method for Implementing Paged, Segmented Virtual Memories on Microprogrammable Computers. ACM SIGOPS Oper. Syst. Rev. 13(2): 26-32 (1979) - 1978
- [j10]Andrew S. Tanenbaum:
Implications of Structured Programming for Machine Architecture. Commun. ACM 21(3): 237-246 (1978) - [j9]Andrew S. Tanenbaum:
A Comparison of PASCAL and ALGOL 68. Comput. J. 21(4): 316-323 (1978) - [j8]Andrew S. Tanenbaum:
Review of Processor architecture by S. H. Lavington. NCC Publications, Manchester 1976. SIGARCH Comput. Archit. News 6(6): 31 (1978) - [j7]Andrew S. Tanenbaum, Paul Klint, A. P. Wim Böhm:
Guidelines for Software Portability. Softw. Pract. Exp. 8(6): 681-698 (1978) - 1977
- [j6]Andrew S. Tanenbaum:
Corrigenda: "A Tutorial on Algol 68". ACM Comput. Surv. 9(3): 255-256 (1977) - [j5]Andrew S. Tanenbaum:
Ambiguous machine architecture and program efficiency. SIGARCH Comput. Archit. News 6(3): 11-13 (1977) - 1976
- [j4]Andrew S. Tanenbaum:
A Tutorial on Algol 68. ACM Comput. Surv. 8(2): 155-190 (1976) - [j3]Andrew S. Tanenbaum:
In defense of program testing or correctness proofs considered harmful. ACM SIGPLAN Notices 11(5): 64-68 (1976) - [j2]Andrew S. Tanenbaum:
A General-Purpose Macro Processor as a Poor Man's Compiler-Compiler. IEEE Trans. Software Eng. 2(2): 121-125 (1976) - 1973
- [j1]Andrew S. Tanenbaum, William H. Benson:
The People's Time Sharing System. Softw. Pract. Exp. 3(2): 109-119 (1973)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint