researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Operating Systems Review
Home
Index
Info
Volume
Volume
32
, Issue
4
3
--
8
Geoffrey M. Voelker
.
Report on the SIGMETRICS 98/PERFORMANCE 98 Joint International Conference on Measuerment and Modeling of Computer Systems
9
--
20
Ross J. Anderson
,
Francesco Bergadano
,
Bruno Crispo
,
Jong-Hyeon Lee
,
Charalampos Manifavas
,
Roger M. Needham
.
A New Family of Authentication Protocols
21
--
24
Chris J. Mitchell
,
Chan Yeob Yeun
.
Fixing a Problem in the Helsinki Protocol
25
--
32
Danai Patiyoot
,
S. J. Shepherd
.
Techniques for Authentication Protocols and Key Distribution on Wireless ATM Networks
33
--
39
Marc Joye
,
Sung-Ming Yen
.
ID-based Secret-Key Cryptography
40
--
46
Bernhard Wagner
.
Controlling Cgi Programs
47
--
61
Winfried E. Kühnhauser
.
A Classification of Interdomain Actions
62
--
69
Stein Jørgen Ryan
.
Synchronization in Portable Device Drivers
70
--
76
Xiaohui Wei
,
Jiubin Ju
.
SFT: A Consistent Checkpointing Algorithm With Shorter Freezing Time
77
--
80
Steven Robbins
.
Introducing Empirical Investigation in Undergraduate Operating Systems
Volume
32
, Issue
3
1
--
2
William M. Waite
.
Is Operating Systems Review Obsolete?
7
--
20
Shouhuai Xu
,
Gendu Zhang
,
Hong Zhu
.
On the Security of Three-Party Cryptographic Protocols
21
--
29
Amjad Mahmood
.
Task Allocation in Distributed Computing Systems
30
--
50
Sung-Il Kang
,
Heung-Kyu Lee
.
Analysis and Solution of Non-preemptive Policies for Scheduling Readers and Writers
51
--
54
George Dimitoglou
.
Deadlocks and Methods for their Detection, Prevention and Recovery in Modern Operating Systems
55
--
63
Lu Sanglu
,
Xie Li
.
A Scalable Load Balancing System for NOWs
64
--
71
Zhonghua Yang
,
Chengzheng Sun
.
CORBA For Hard Real Time Applications: Some Critical Issues
72
--
80
Rajesh Bordawekar
.
A Case for Compositional File Systems (Extended Abstract)
Volume
32
, Issue
2
1
--
0
William M. Waite
.
Is Operating Systems Review Obsolete?
2
--
3
Günter Haring
,
Christoph Lindemann
,
Martin Reiser
.
International Workshop Performance Evaluation - Origins and Directions
4
--
15
Marco de Vivo
,
Gabriela O. de Vivo
,
Germinal Isern
.
Internet Security Attacks at the Basic Levels
16
--
32
Stefanos Gritzalis
,
George Aggelis
.
Security Issues Surrounding Programming Languages for Mobile Code: Java vs. Safe-Tcl
Volume
32
, Issue
1
1
--
2
Carla Schlatter Ellis
.
SIGOPS README
3
--
22
Edward A. Feustel
,
Terry Mayfield
.
The DGSA: Unmet Information Security Challenges for Operating System Designers
23
--
28
Birgit Pfitzmann
,
Michael Waidner
.
How to Break Fraud-Detectable Key Recovery
29
--
40
Theodore Faber
.
Optimizing Throughput in a Workstation-based Network File System over a High Bandwidth Local Area Network
41
--
56
Özalp Babaoglu
,
Renzo Davoli
,
Alberto Montresor
,
Roberto Segala
.
System Support for Partition-Aware Network Applications
57
--
64
Yanxiang He
,
Donald H. Cooley
,
Jianping Zhang
.
Planning Management of Multiagent-Based Distributed Open Computing Environment Model