Journal: Operating Systems Review

Volume 34, Issue 3

5 -- 10John A. Trono, William E. Taylor. Further comments on A correct and unrestrictive implementation of general semaphores
11 -- 15Baowen Xu. Tagged Semaphores
16 -- 18Pengjun Pei, Guohua Cui, Kun Peng. On a Session Key Compromise Problem in [KC95] protocol
19 -- 28Yongxing Sun, Xinmei Wang. An approach to finding the attacks on the cryptographic protocols
29 -- 39Li Ji, Li Tianning, Guihai Chen, Xie Lie, C. L. Wang. Strategies Optimization and Integration in DSM
40 -- 55Kamil Iskra, Frank van der Linden, Zeger W. Hendrikse, Benno J. Overeinder, G. Dick van Albada, Peter M. A. Sloot. The implementation of Dynamite - an environment for migrating PVM tasks
56 -- 59Chris J. Mitchell. Making serial number based authentication robust against loss of state
60 -- 68Abdelmadjid Bouabdallah, Christian Laforest. A Distributed token/based Algorithm for the Dynamic Resource Allocation Problem
69 -- 80G. Alan Creak, Robert Sheehan. A Top-Down Operating System Course