


default search action
Operating Systems Review, Volume 32, 1998
Volume 32, Number 1, January 1998
- Carla Schlatter Ellis:

SIGOPS README. 1-2 - Edward A. Feustel, Terry Mayfield:

The DGSA: Unmet Information Security Challenges for Operating System Designers. 3-22 - Birgit Pfitzmann, Michael Waidner

:
How to Break Fraud-Detectable Key Recovery. 23-28 - Theodore Faber:

Optimizing Throughput in a Workstation-based Network File System over a High Bandwidth Local Area Network. 29-40 - Özalp Babaoglu

, Renzo Davoli
, Alberto Montresor, Roberto Segala
:
System Support for Partition-Aware Network Applications. 41-56 - Yanxiang He, Donald H. Cooley, Jianping Zhang:

Planning Management of Multiagent-Based Distributed Open Computing Environment Model. 57-64
Volume 32, Number 2, April 1998
- William M. Waite:

Is Operating Systems Review Obsolete? 1 - Günter Haring, Christoph Lindemann, Martin Reiser:

International Workshop Performance Evaluation - Origins and Directions. 2-3 - Marco de Vivo, Gabriela O. de Vivo, Germinal Isern:

Internet Security Attacks at the Basic Levels. 4-15 - Stefanos Gritzalis

, George Aggelis:
Security Issues Surrounding Programming Languages for Mobile Code: Java vs. Safe-Tcl. 16-32
Volume 32, Number 3, July 1998
- William M. Waite:

Is Operating Systems Review Obsolete? 1-2 - Shouhuai Xu, Gendu Zhang, Hong Zhu:

On the Security of Three-Party Cryptographic Protocols. 7-20 - Amjad Mahmood:

Task Allocation in Distributed Computing Systems. 21-29 - Sung-Il Kang, Heung-Kyu Lee:

Analysis and Solution of Non-preemptive Policies for Scheduling Readers and Writers. 30-50 - George Dimitoglou:

Deadlocks and Methods for their Detection, Prevention and Recovery in Modern Operating Systems. 51-54 - Sanglu Lu, Li Xie:

A Scalable Load Balancing System for NOWs. 55-63 - Zhonghua Yang, Chengzheng Sun:

CORBA For Hard Real Time Applications: Some Critical Issues. 64-71 - Rajesh Bordawekar:

A Case for Compositional File Systems (Extended Abstract). 72-80
Volume 32, Number 4, October 1998
- Geoffrey M. Voelker:

Report on the SIGMETRICS '98/PERFORMANCE '98 Joint International Conference on Measuerment and Modeling of Computer Systems. 3-8 - Ross J. Anderson, Francesco Bergadano

, Bruno Crispo, Jong-Hyeon Lee, Charalampos Manifavas, Roger M. Needham:
A New Family of Authentication Protocols. 9-20 - Chris J. Mitchell

, Chan Yeob Yeun:
Fixing a Problem in the Helsinki Protocol. 21-24 - Danai Patiyoot, Simon J. Shepherd:

Techniques for Authentication Protocols and Key Distribution on Wireless ATM Networks. 25-32 - Marc Joye, Sung-Ming Yen:

ID-based Secret-Key Cryptography. 33-39 - Bernhard Wagner:

Controlling Cgi Programs. 40-46 - Winfried E. Kühnhauser:

A Classification of Interdomain Actions. 47-61 - Stein Jørgen Ryan:

Synchronization in Portable Device Drivers. 62-69 - Xiaohui Wei, Jiubin Ju:

SFT: A Consistent Checkpointing Algorithm With Shorter Freezing Time. 70-76 - Steven Robbins:

Introducing Empirical Investigation in Undergraduate Operating Systems. 77-80
Volume 32, Number 5, December 1998
- Dileep Bhandarkar, Anant Agarwal:

ASPLOS-VIII Proceedings of the 8th International Conference on Architectural Support for Programming Languages and Operating Systems, San Jose, California, USA, October 3-7, 1998. ACM Press 1998, ISBN 1-58113-107-0 [contents]

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














