Journal: Operating Systems Review

Volume 39, Issue 4

4 -- 17Keith Loepere. Stackable thread mechanisms
18 -- 22Joseph M. Gwinn. Quality-of-Service versus Realtime
23 -- 36Vijay Shivshanker Gupta. Trust and accountability issues in scalable invalidation-based web cache consistency
37 -- 45Mais Nijim, Tao Xie 0004, Xiao Qin. Performance analysis of an admission controller for CPU- and I/O-intensive applications in self-managing computer systems
46 -- 65Chien-Fu Cheng, Shu-Ching Wang, Tyne Liang. Multi-agent schema of Mobile IP protocol for mobile environment
66 -- 79Chih-Hung Wang, Yan-Sheng Kuo. An efficient contract signing protocol using the aggregate signature scheme to protect signers privacy and promote reliability
80 -- 96Shu-Chin Wang, M. L. Chiang, Kuo-Qin Yan, K. F. Jea. Streets of consensus under unknown unreliable network

Volume 39, Issue 3

4 -- 23Yair Wiseman, Karsten Schwan, Patrick Widener. Efficient end to end data exchange using configurable compression
24 -- 33Zhiqiang Lin, Chao Wang, Bing Mao, Li Xie. A policy flexible architecture for secure operating system
34 -- 43Jorge Herrerías Guerrero, Roberto Gómez Cárdenas. An example of communication between security tools: iptables - snort
44 -- 51Luo Guangchun, Xianliang Lu, Ting Yang. The research on consistency of space/time of IDS
52 -- 63Yan Tang, Tao Wang, Xiaoming Li. The design and implementation of LilyTask in shared memory
64 -- 71A. Vijay Srinivas, D. Janaki Ram. A model for characterizing the scalability of distributed systems
72 -- 81Youhui Zhang, Dongsheng Wong, Weimin Zheng. User-level checkpoint and recovery for LAM/MPI
82 -- 89Kuo-Qin Yan, Shu-Ching Wang. The bounds of faulty components on consensus with dual failure modes
90 -- 96Yi-Hwa Chen, Jinn-ke Jan. Enhancement of digital signature with message recovery using self-certified public keys and its variants

Volume 39, Issue 2

4 -- 40Edsger W. Dijkstra. My recollections of operating system design
41 -- 46Cliff B. Jones, David B. Lomet, Alexander B. Romanovsky, Gerhard Weikum, Alan Fekete, Marie-Claude Gaudel, Henry F. Korth, Rogério de Lemos, J. Eliot B. Moss, Ravi Rajwar, Krithi Ramamritham, Brian Randell, Luís Rodrigues. The atomic manifesto: a story in four quarks
47 -- 50Gertrude Neuman Levine. The classification of deadlock prevention and avoidance is erroneous
51 -- 53Rushikesh K. Joshi, Subash Rajaa. Modeling VP operation: the Diwali Festival Problem
54 -- 70Marisa Gil, Ruben Pinilla. Thread coloring: a scheduler proposal from user to hardware threads
71 -- 73Robert Steinke, Micah Clark, Elihu McMahon. A new pattern for flexible worker threads with in-place consumption message queues
74 -- 78Yair Wiseman. ARC based superpaging
79 -- 93Catherine Dodge, Cynthia E. Irvine, Thuy D. Nguyen. A study of initialization in Linux and OpenBSD
94 -- 96Kuo-Feng Hwang, I-En Liao. Two attacks on a user friendly remote authentication scheme with smart cards

Volume 39, Issue 1

4 -- 21Shihyu Chou, Eric Jui-Lin Lu, Yi-Hui Chen. X-RDR: a role-based delegation processor for web-based information systems
22 -- 33Jia Song. Segment-based proxy caching for distributed cooperative media content servers
34 -- 39Chuan Zhan, Xianliang Lu, Meng-shu Hou, Xu Zhou. A LVQ-based neural network anti-spam email approach
40 -- 47Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati, Deepak B. Phatak. Hierarchical key management scheme using polynomial interpolation
48 -- 55Ting Yi Chang, Min-Shiang Hwang, Wei-Pang Yang. A new multi-stage secret sharing scheme using one-way function
56 -- 62Meng-shu Hou, Xianliang Lu, Xu Zhou, Chuan Zhan. A trust model of p2p system based on confirmation theory
63 -- 69Xu Zhou, Xianliang Lu, Meng-shu Hou, Chuan Zhan. A speed-based adaptive dynamic parallel downloading technique
70 -- 84Ya-Fen Chang, Chin-Chen Chang. An efficient authentication protocol for mobile satellite communication systems
85 -- 89Wei-Chi Ku, Min-Hung Chiang, Shen-Tien Chang. Weaknesses of Yoon-Ryu-Yoo s hash-based password authentication scheme
90 -- 96Wei-Chi Ku, Shuai-Min Chen. Cryptanalysis of a flexible remote user authentication scheme using smart cards