


default search action
Operating Systems Review, Volume 36, 2002
Volume 36, Number 1, January 2002
- David Kotz:

Message from the Chair, Novemver 2001. 1 - Michael Dahlin:

Summary of 2001 SIGOPS Business Meeting. 2-4 - Valérie Issarny:

Upcoming Events in Operating System Research. 5-7 - Stuart Eichert, Osman N. Ertugay, Dan M. Nessett, Suresh Vobbilisetty:

Commercially Viable Active Networking. 8-22 - Danai Patiyoot:

Migration / Evolution of security towards wireless ATM. 23-30 - Danai Patiyoot:

Security Issues for Wireless ATM Networks. 31-57 - Stephen D. Wolthusen:

Access and Use Control using Externally Controlled Reference Monitors. 58-69 - Yun Mao, Youhui Zhang, Dongsheng Wang, Weimin Zheng:

LND: A Reliable Multi-Tier Storage Device in NOW. 70-80 - Jun Wen, Xianliang Lu:

The Design of QoS Guarantee Network Subsystem. 81-87 - Yanxiang He, Zhuomin Du, Xuhui Li, Donald H. Cooley, Jing He:

A Field-based Collaboration Strategy in MADCE. 88-96
Volume 36, Number 2, April 2002
- Rimon Barr, John C. Bicket, Daniel S. Dantas, Bowei Du, T. W. Danny Kim, Bing Zhou, Emin Gün Sirer:

On the need for system-level support for ad hoc and sensor networks. 1-5 - Niklas Borselius, Chris J. Mitchell

, Aaron Wilson:
A pragmatic alternative to undetachable signatures. 6-11 - Youhui Zhang, Dongsheng Wang:

A checkpoint-based high availability run-time system for Windows NT clusters. 12-18 - Dan G. Waddington, Ramesh Viswanathan:

Interaction points: exploiting operating system mechanisms for inter-component communications. 19-35 - T. M. Ong, Teck Meng Lim, Bu-Sung Lee, Chai Kiat Yeo:

Unicorn: voluntary computing over Internet. 36-51 - Peng Bi, Fei Xie, Guangwen Yang, Dingxing Wang:

A multi-protocol cross-domain communication model for metacomputing systems. 52-63
Volume 36, Number 3, July 2002
- Felix Rauch, Thomas Stricker:

Comments on "transparent user-level process checkpoint and restore for migration" by Bozyigit and Wasiq. 8-9 - Jun Lu, Xianliang Lu, Hong Han, Qingsong Wei:

A cooperative asynchronous write mechanism for NAS. 25-32 - Yutaka Wada, Zixue Cheng:

An efficient distributed method for allocating resources based on an unobstructed squeezing technique. 33-45 - Cheng-Chi Lee

, Min-Shiang Hwang, Wei-Pang Yang:
A flexible remote user authentication scheme using smart cards. 46-52 - Arun Kumar, Neeran M. Karnik, Girish Chafle:

Context sensitivity in role-based access control. 53-66 - Laurent Amanton, Mohamed Naimi:

The concept of causal-phase ordering for overlapped broadcasts. 67-81 - Chai Kiat Yeo, Bu-Sung Lee, Meng Hwa Er:

A peering architecture for ubiquitous IP multicast streaming. 82-95
Volume 36, Number 4, October 2002
- Hong Han, Xianliang Lu, Jun Lu, Bo Chen, Ren Li Yong:

Data mining aided signature discovery in network-based intrusion detection system. 7-13 - Her-Tyan Yeh

, Hung-Min Sun:
Simple authenticated key agreement protocol resistant to password guessing attacks. 14-22 - Cheng-Chi Lee

, Li-Hua Li
, Min-Shiang Hwang:
A remote user authentication scheme using hash functions. 23-29 - Niklas Borselius, Chris J. Mitchell

, Aaron Wilson:
On the value of threshold signatures. 30-35 - Chao Jin, Weimin Zheng, Feng Zhou, Yinghui Wu:

A distributed persistent object store for scalable service. 36-49 - Jun Lu, Xianliang Lu, Guangchun Luo, Hong Han, Xu Zhou:

STFS: a novel file system for efficient small writes. 50-54 - Nianmin Yao

, Ming-Yang Zheng, Jiu-bin Ju:
Pipeline: a new architecture of high performance servers. 55-64
Volume 36, Number 5, December 2002
- Kourosh Gharachorloo, David A. Wood:

Proceedings of the 10th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-X), San Jose, California, USA, October 5-9, 2002. ACM Press 2002, ISBN 1-58113-574-2 [contents]
Volume 36, Special Issue, Winter 2002
- David E. Culler, Peter Druschel:

5th Symposium on Operating System Design and Implementation (OSDI 2002), Boston, Massachusetts, USA, December 9-11, 2002. USENIX Association 2002, ISBN 978-1-4503-0111-4 [contents]

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














