


default search action
Operating Systems Review, Volume 39, 2005
Volume 39, Number 1, January 2005
- Shihyu Chou, Eric Jui-Lin Lu, Yi-Hui Chen:

X-RDR: a role-based delegation processor for web-based information systems. 4-21 - Jia Song:

Segment-based proxy caching for distributed cooperative media content servers. 22-33 - Chuan Zhan, Xianliang Lu, Meng-shu Hou, Xu Zhou:

A LVQ-based neural network anti-spam email approach. 34-39 - Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati, Deepak B. Phatak:

Hierarchical key management scheme using polynomial interpolation. 40-47 - Ting Yi Chang, Min-Shiang Hwang, Wei-Pang Yang:

A new multi-stage secret sharing scheme using one-way function. 48-55 - Meng-shu Hou, Xianliang Lu, Xu Zhou, Chuan Zhan:

A trust model of p2p system based on confirmation theory. 56-62 - Xu Zhou, Xianliang Lu, Meng-shu Hou, Chuan Zhan:

A speed-based adaptive dynamic parallel downloading technique. 63-69 - Ya-Fen Chang, Chin-Chen Chang:

An efficient authentication protocol for mobile satellite communication systems. 70-84 - Wei-Chi Ku, Min-Hung Chiang, Shen-Tien Chang:

Weaknesses of Yoon-Ryu-Yoo's hash-based password authentication scheme. 85-89 - Wei-Chi Ku, Shuai-Min Chen:

Cryptanalysis of a flexible remote user authentication scheme using smart cards. 90-96
Volume 39, Number 2, April 2005
- Edsger W. Dijkstra:

My recollections of operating system design. 4-40 - Cliff B. Jones

, David B. Lomet, Alexander B. Romanovsky
, Gerhard Weikum, Alan D. Fekete, Marie-Claude Gaudel, Henry F. Korth, Rogério de Lemos, J. Eliot B. Moss, Ravi Rajwar, Krithi Ramamritham, Brian Randell, Luís E. T. Rodrigues:
The atomic manifesto: a story in four quarks. 41-46 - Gertrude Neuman Levine:

The classification of deadlock prevention and avoidance is erroneous. 47-50 - Rushikesh K. Joshi, Subash Rajaa:

Modeling VP operation: the Diwali Festival Problem. 51-53 - Marisa Gil

, Ruben Pinilla:
Thread coloring: a scheduler proposal from user to hardware threads. 54-70 - Robert Steinke, Micah Clark, Elihu McMahon:

A new pattern for flexible worker threads with in-place consumption message queues. 71-73 - Yair Wiseman:

ARC based superpaging. 74-78 - Catherine Dodge, Cynthia E. Irvine, Thuy D. Nguyen:

A study of initialization in Linux and OpenBSD. 79-93 - Kuo-Feng Hwang, I-En Liao:

Two attacks on a user friendly remote authentication scheme with smart cards. 94-96
Volume 39, Number 3, July 2005
- Yair Wiseman, Karsten Schwan, Patrick M. Widener

:
Efficient end to end data exchange using configurable compression. 4-23 - Zhiqiang Lin, Chao Wang, Bing Mao, Li Xie:

A policy flexible architecture for secure operating system. 24-33 - Jorge Herrerías Guerrero, Roberto Gómez Cárdenas:

An example of communication between security tools: iptables - snort. 34-43 - Guangchun Luo, Xianliang Lu, Ting Yang:

The research on consistency of space/time of IDS. 44-51 - Yan Tang, Tao Wang, Xiaoming Li:

The design and implementation of LilyTask in shared memory. 52-63 - A. Vijay Srinivas, D. Janaki Ram:

A model for characterizing the scalability of distributed systems. 64-71 - Youhui Zhang, Dongsheng Wong, Weimin Zheng:

User-level checkpoint and recovery for LAM/MPI. 72-81 - Kuo-Qin Yan, Shu-Ching Wang:

The bounds of faulty components on consensus with dual failure modes. 82-89 - Yi-Hwa Chen, Jinn-ke Jan:

Enhancement of digital signature with message recovery using self-certified public keys and its variants. 90-96
Volume 39, Number 4, October 2005
- Keith Loepere:

Stackable thread mechanisms. 4-17 - Joseph M. Gwinn:

Quality-of-Service versus Realtime. 18-22 - Vijay Shivshanker Gupta:

Trust and accountability issues in scalable invalidation-based web cache consistency. 23-36 - Mais Nijim, Tao Xie, Xiao Qin

:
Performance analysis of an admission controller for CPU- and I/O-intensive applications in self-managing computer systems. 37-45 - Chien-Fu Cheng

, Shu-Ching Wang, Tyne Liang:
Multi-agent schema of Mobile IP protocol for mobile environment. 46-65 - Chih-Hung Wang, Yan-Sheng Kuo:

An efficient contract signing protocol using the aggregate signature scheme to protect signers' privacy and promote reliability. 66-79 - Shu-Chin Wang, Mao-Lun Chiang

, Kuo-Qin Yan, Kuen-Fang Jea:
Streets of consensus under unknown unreliable network. 80-96
Volume 39, Number 5, December 2005
- Andrew Herbert, Kenneth P. Birman:

Proceedings of the 20th ACM Symposium on Operating Systems Principles 2005, SOSP 2005, Brighton, UK, October 23-26, 2005. ACM 2005, ISBN 1-59593-079-5 [contents]

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














