5 | -- | 10 | John A. Trono, William E. Taylor. Further comments on A correct and unrestrictive implementation of general semaphores |
11 | -- | 15 | Baowen Xu. Tagged Semaphores |
16 | -- | 18 | Pengjun Pei, Guohua Cui, Kun Peng. On a Session Key Compromise Problem in [KC95] protocol |
19 | -- | 28 | Yongxing Sun, Xinmei Wang. An approach to finding the attacks on the cryptographic protocols |
29 | -- | 39 | Li Ji, Li Tianning, Guihai Chen, Xie Lie, C. L. Wang. Strategies Optimization and Integration in DSM |
40 | -- | 55 | Kamil Iskra, Frank van der Linden, Zeger W. Hendrikse, Benno J. Overeinder, G. Dick van Albada, Peter M. A. Sloot. The implementation of Dynamite - an environment for migrating PVM tasks |
56 | -- | 59 | Chris J. Mitchell. Making serial number based authentication robust against loss of state |
60 | -- | 68 | Abdelmadjid Bouabdallah, Christian Laforest. A Distributed token/based Algorithm for the Dynamic Resource Allocation Problem |
69 | -- | 80 | G. Alan Creak, Robert Sheehan. A Top-Down Operating System Course |