Journal: Operating Systems Review

Volume 36, Issue 4

7 -- 13Hong Han, Xianliang Lu, Jun Lu, Bo Chen, Ren Li Yong. Data mining aided signature discovery in network-based intrusion detection system
14 -- 22Her-Tyan Yeh, Hung-Min Sun. Simple authenticated key agreement protocol resistant to password guessing attacks
23 -- 29Cheng-Chi Lee, Li-Hua Li, Min-Shiang Hwang. A remote user authentication scheme using hash functions
30 -- 35Niklas Borselius, Chris J. Mitchell, Aaron Wilson. On the value of threshold signatures
36 -- 49Chao Jin, Weimin Zheng, Feng Zhou, Yinghui Wu. A distributed persistent object store for scalable service
50 -- 54Lu Jun, Xianliang Lu, Luo Guangchun, Han Hong, Zhou Xu. STFS: a novel file system for efficient small writes
55 -- 64Nian-Min Yao, Ming-Yang Zheng, Jiu-bin Ju. Pipeline: a new architecture of high performance servers

Volume 36, Issue 3

8 -- 9Felix Rauch, Thomas Stricker. Comments on transparent user-level process checkpoint and restore for migration by Bozyigit and Wasiq
25 -- 32Lu Jun, Xianliang Lu, Han Hong, Qingsong Wei. A cooperative asynchronous write mechanism for NAS
33 -- 45Yutaka Wada, Zixue Cheng. An efficient distributed method for allocating resources based on an unobstructed squeezing technique
46 -- 52Cheng-Chi Lee, Min-Shiang Hwang, Wei-Pang Yang. A flexible remote user authentication scheme using smart cards
53 -- 66Arun Kumar, Neeran M. Karnik, Girish Chafle. Context sensitivity in role-based access control
67 -- 81Laurent Amanton, Mohamed Naimi. The concept of ::::causal-phase:::: ordering for overlapped broadcasts
82 -- 95Chai Kiat Yeo, Bu-Sung Lee, Meng Hwa Er. A peering architecture for ubiquitous IP multicast streaming

Volume 36, Issue 2

1 -- 5Rimon Barr, John C. Bicket, Daniel S. Dantas, Bowei Du, T. W. Danny Kim, Bing Zhou, Emin Gün Sirer. On the need for system-level support for ad hoc and sensor networks
6 -- 11Niklas Borselius, Chris J. Mitchell, Aaron Wilson. A pragmatic alternative to undetachable signatures
12 -- 18Youhui Zhang, Dongsheng Wang. A checkpoint-based high availability run-time system for Windows NT clusters
19 -- 35Dan G. Waddington, Ramesh Viswanathan. Interaction points: exploiting operating system mechanisms for inter-component communications
36 -- 51T. M. Ong, T. M. Lim, B. S. Lee, C. K. Yeo. Unicorn: voluntary computing over Internet
52 -- 63Peng Bi, Fei Xie, Guangwen Yang, Dingxing Wang. A multi-protocol cross-domain communication model for metacomputing systems

Volume 36, Issue 1

1 -- 0David Kotz. Message from the Chair, Novemver 2001
2 -- 4Michael Dahlin. Summary of 2001 SIGOPS Business Meeting
5 -- 7Valérie Issarny. Upcoming Events in Operating System Research
8 -- 22Stuart Eichert, Osman N. Ertugay, Dan M. Nessett, Suresh Vobbilisetty. Commercially Viable Active Networking
23 -- 30Danai Patiyoot. Migration / Evolution of security towards wireless ATM
31 -- 57Danai Patiyoot. Security Issues for Wireless ATM Networks
58 -- 69Stephen D. Wolthusen. Access and Use Control using Externally Controlled Reference Monitors
70 -- 80Yun Mao, Youhui Zhang, Dongsheng Wang, Weimin Zheng. LND: A Reliable Multi-Tier Storage Device in NOW
81 -- 87Jun Wen, Xianliang Lu. The Design of QoS Guarantee Network Subsystem
88 -- 96Yanxiang He, Zhuomin Du, Xuhui Li, Donald H. Cooley, Jing He. A Field-based Collaboration Strategy in MADCE