


default search action
Operating Systems Review, Volume 35, 2001
Volume 35, Number 1, January 2001
- Valérie Issarny:

Upcoming Events in Operating System Research. 1-5 - Dongyao Ji, Yuming Wang:

Comments on "An approach to the formal verification of the two-party cryptographic protocols" by Zhang, Li and Xiao. 6-7 - Bruce K. Haddon:

IEEE Storage System Standards. 8-16 - Ming-Yuan Zhu, Lei Luo, Guang-Zhe Xiong:

A Provably Correct Operating System: delta-Core. 17-33 - D. Janaki Ram, M. Uma Mahesh, N. S. K. Chandra Sekhar, Chitra Babu

:
Causal Consistency in Mobile Environment. 34-40 - Chun-Li Lin, Hung-Min Sun, Tzonelih Hwang:

Efficient and Practical DHEKE Protocols. 41-47 - Daniel P. Bovet, Marco Cesati

:
A Real Bottom-Up Operatiing Systems Course. 48-60 - Herman Chung-Hwa Rao, Yih-Farn Chen, Ming-Feng Chen:

A Proxy-Based Personal Web Archiving Service. 61-72 - Alberto Montresor, Renzo Davoli

, Özalp Babaoglu:
Middleware for Dependable Network Services in Partitionable Distributed Systems. 73-84 - Maurice Herlihy, Srikanta Tirthapura, Roger Wattenhofer:

Ordered Multicast and Distributed Swap. 85-96
Volume 35, Number 2, April 2001
- Valérie Issarny:

Upcoming Events in Operating System Research. 1-6 - Greg Eisenhauer, Fabián E. Bustamante, Karsten Schwan:

A Middleware Toolkit for Client-Initiated Service Specialization. 7-20 - Ahmed Al-Theneyan, Piyush Mehrotra, Mohammad Zubair:

Enhancing Jini for Use Across Non-Multicastable Networks. 21-30 - Radu Litiu, Atul Prakash

:
DACIA: A Mobile Component Framework for Buildinh Adaptive Distributed Applications. 31-42 - Yuqing Zhang, Chunling Wang, Jianping Wu, Xing Li:

Using SMV for Cryptographic Protocol Analysis: A Case Study. 43-50 - Zhiyi Huang, Chengzheng Sun, Martin K. Purvis, Stephen Cranefield:

View-based Consistency and False Sharing Effect in Distributed Shared Memory. 51-60 - Athena Vakali

, Evimaria Terzi:
Multimedia Data Storage and Representation Issues on Tertiary Storage Subssystems: An Overview. 61-77 - Youhui Zhang, Dongsheng Wang, Weimin Zheng:

Transparent Checkpointing and Rollback Recovery Mechanism for Windows NT Applications. 78-85 - M. Bozyigit, M. Wasiq:

User-Level Process Checkpoint and Restore for Migration. 86-96
Volume 35, Number 3, July 2001
- Henry M. Levy:

Call for Nominations - ACM SIGOPS Mark Weiser Award. 1 - Valérie Issarny:

Upcoming Events in Operating System Research. 2-5 - Jason Crampton, George Loizou:

Authorisation and antichains. 6-15 - Alok Shriram, Anuraag Sarangi, Avinash Shankar:

ICHU Model For Processor Allocation In Distributed Operating Systems. 16-21 - Ming-Yuan Zhu, Lei Luo, Guang-Zhe Xiong:

The Minimal Model of Operating Systems. 22-29 - Bu-Sung Lee, Wentong Cai

, Stephen John Turner
, Jit-Beng Koh:
Comparison of Network Protocol and Architecture for Distributed Virtual Simulation Environment. 30-42 - Vijay Gupta:

A Distributed Backoff Algorithm to support real-time traffic on Ethernet. 43-54 - Bidyut Gupta, Samir K. Banerjee:

A Roll-Forward Recovery Scheme for Solving the Problem of Coasting Forward for Distributed Systems. 55-66 - Jun Wen, Xiang-liang Li:

Realize Network subsystem QoS gurantee. 67-71
Volume 35, Number 4, October 2001
- Valérie Issarny:

Upcoming Events in Operating Systems Research. 1-5 - Gregory Saunders, Michael Hitchens

, Vijay Varadharajan:
Role-Based Access Control and the Access Control Matrix. 6-20 - Dan Oestreicher:

Experience With a Commercial Java Implementation of Group Communication using Reliable Multicast. 21-31 - Chang-Seop Park, Dong Hoon Lee:

Secure and Efficient Key Management for Dynamic Multicast Groups. 32-38 - Yuhong Li, Lars C. Wolf:

Collection of Network Information in Active Networks. 39-49 - Constantinos Dovrolis, Brad Thayer, Parameswaran Ramanathan:

HIP: Hybrid Interrupt-Polling for the Network Interface. 50-60 - Sukanya Suranauwarat, Hideo Taniguchi:

The Design, Implementation and Initial Evaluation of an Advanced Knowledge-based Process Scheduler. 61-81 - Tao Huang, Teng Xu, Xianliang Lu:

A High Resolution Disk I/O Trace System. 82-87 - Stefan Ludwig, Winfried Kalfa:

File System Encryption with Integrated User Management. 88-93 - Dawu Gu, Wang Yi:

On the Techniques of Enhancing the Security of Block Ciphers. 94-96
Volume 35, Number 5, December 2001
- Keith Marzullo, Mahadev Satyanarayanan:

Proceedings of the 18th ACM Symposium on Operating System Principles, SOSP 2001, Chateau Lake Louise, Banff, Alberta, Canada, October 21-24, 2001. ACM 2001, ISBN 1-58113-389-8 [contents]

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














