Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/csys/csys7.bht:"
@article{DBLP:journals/csys/CarsonS94, author = {Scott D. Carson and Sanjeev Setia}, title = {Optimal Write Batch Size in Log-Structured File Systems}, journal = {Comput. Syst.}, volume = {7}, number = {2}, pages = {263--281}, year = {1994}, url = {http://www.usenix.org/publications/compsystems/1994/spr\_carson.pdf}, timestamp = {Sun, 10 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csys/CarsonS94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csys/DearleBFHLRV94, author = {Alan Dearle and Rex di Bona and James Farrow and Frans A. Henskens and Anders Lindstr{\"{o}}m and John Rosenberg and Francis Vaughan}, title = {Grasshopper: An Orthogonally Persistent Operating System}, journal = {Comput. Syst.}, volume = {7}, number = {3}, pages = {289--312}, year = {1994}, url = {http://www.usenix.org/publications/compsystems/1994/sum\_dearle.pdf}, timestamp = {Sun, 10 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csys/DearleBFHLRV94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csys/HeydonT94, author = {Allan Heydon and J. D. Tygar}, title = {Specifying and Checking {UNIX} Security Constraints}, journal = {Comput. Syst.}, volume = {7}, number = {1}, pages = {91--112}, year = {1994}, url = {http://www.usenix.org/publications/compsystems/1994/win\_heydon.pdf}, timestamp = {Sun, 10 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csys/HeydonT94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csys/InghamP94, author = {David B. Ingham and Graham D. Parrington}, title = {Delayline: {A} Wide-Area Network Emulation Tool}, journal = {Comput. Syst.}, volume = {7}, number = {3}, pages = {313--332}, year = {1994}, url = {http://www.usenix.org/publications/compsystems/1994/sum\_ingham.pdf}, timestamp = {Sun, 10 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csys/InghamP94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csys/KrajewskiCCT94, author = {Marjan Krajewski Jr. and John C. Chipchak and David A. Chodorow and Jonathan T. Trostle}, title = {Applicability of Smart Cards to Network User Authentication}, journal = {Comput. Syst.}, volume = {7}, number = {1}, pages = {75--89}, year = {1994}, url = {http://www.usenix.org/publications/compsystems/1994/win\_krajewski.pdf}, timestamp = {Sun, 10 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csys/KrajewskiCCT94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csys/LaPadula94, author = {Leonard J. LaPadula}, title = {A Rule-Set Approach to Formal Modeling of a Trusted Computer System}, journal = {Comput. Syst.}, volume = {7}, number = {1}, pages = {113--167}, year = {1994}, url = {http://www.usenix.org/publications/compsystems/1994/win\_lapadula.pdf}, timestamp = {Sun, 10 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csys/LaPadula94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csys/LaumannB94, author = {Oliver Laumann and Carsten Bormann}, title = {Elk: The Extension Language Kit}, journal = {Comput. Syst.}, volume = {7}, number = {4}, pages = {419--449}, year = {1994}, url = {http://www.usenix.org/publications/compsystems/1994/fall\_laumann.pdf}, timestamp = {Sun, 10 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csys/LaumannB94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csys/LongM94, author = {Darrell D. E. Long and Bruce R. Montague}, title = {Swift/RAID: {A} Distributed {RAID} System}, journal = {Comput. Syst.}, volume = {7}, number = {3}, pages = {333--359}, year = {1994}, url = {http://www.usenix.org/publications/compsystems/1994/sum\_long.pdf}, timestamp = {Sun, 10 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csys/LongM94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csys/Mogul94, author = {Jeffrey C. Mogul}, title = {Recovery in Spritely {NFS}}, journal = {Comput. Syst.}, volume = {7}, number = {2}, pages = {201--262}, year = {1994}, url = {http://www.usenix.org/publications/compsystems/1994/spr\_mogul.pdf}, timestamp = {Sun, 10 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csys/Mogul94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csys/Nilsen94, author = {Kelvin D. Nilsen}, title = {Reliable Real-Time Garbage Collection of {C++}}, journal = {Comput. Syst.}, volume = {7}, number = {4}, pages = {467--504}, year = {1994}, url = {http://www.usenix.org/publications/compsystems/1994/fall\_nilsen.pdf}, timestamp = {Sun, 10 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csys/Nilsen94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csys/OyangW94, author = {Yen{-}Jen Oyang and Le{-}Chun Wu}, title = {Optimal Design of Megabyte Second-Level Caches for Minimizing Bus Traffic in Shared-Memory Shared-Bus Multiprocessors}, journal = {Comput. Syst.}, volume = {7}, number = {3}, pages = {393--408}, year = {1994}, url = {http://www.usenix.org/publications/compsystems/1994/sum\_oyang.pdf}, timestamp = {Sun, 10 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csys/OyangW94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csys/Ware94, author = {Willis H. Ware}, title = {Policy Considerations for Data Networks}, journal = {Comput. Syst.}, volume = {7}, number = {1}, pages = {1--44}, year = {1994}, url = {http://www.usenix.org/publications/compsystems/1994/win\_ware.pdf}, timestamp = {Sun, 10 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csys/Ware94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csys/Welch94, author = {Brent B. Welch}, title = {A Comparison of Three Distributed File System Architectures: Vnode, Sprite, and Plan 9}, journal = {Comput. Syst.}, volume = {7}, number = {2}, pages = {175--199}, year = {1994}, url = {http://www.usenix.org/publications/compsystems/1994/spr\_welch.pdf}, timestamp = {Sun, 10 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csys/Welch94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csys/Winckler94, author = {Andreas Winckler}, title = {A Distributed Look-Ahead Workload Assignment Algorithm for Interdependent Tasks}, journal = {Comput. Syst.}, volume = {7}, number = {3}, pages = {361--391}, year = {1994}, url = {http://www.usenix.org/publications/compsystems/1994/sum\_winckler.pdf}, timestamp = {Sun, 10 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csys/Winckler94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csys/Yahalom94, author = {Raphael Yahalom}, title = {Secure Timeliness: On the Cost of Non-Synchronized Clocks}, journal = {Comput. Syst.}, volume = {7}, number = {4}, pages = {451--465}, year = {1994}, url = {http://www.usenix.org/publications/compsystems/1994/fall\_yahalom.pdf}, timestamp = {Sun, 10 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csys/Yahalom94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csys/YahalomKB94, author = {Raphael Yahalom and Birgit Klein and Thomas Beth}, title = {Trust-Based Navigation in Distribution Systems}, journal = {Comput. Syst.}, volume = {7}, number = {1}, pages = {45--73}, year = {1994}, url = {http://www.usenix.org/publications/compsystems/1994/win\_yahalom.pdf}, timestamp = {Sun, 10 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csys/YahalomKB94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.