


default search action
ACM Transactions on Computer Systems (TOCS), Volume 1
Volume 1, Number 1, February 1983
- David P. Reed:

Implementing Atomic Actions on Decentralized Data. 3-23 - Douglas W. Clark:

Cache Performance in the VAX-11/780. 24-37 - Adi Shamir:

On the Generation of Cryptographically Strong Pseudorandom Sequences. 38-44 - George W. Cox, William M. Corwin, Konrad K. Lai, Fred J. Pollack:

Interprocess Communication and Processor Dispatching on the Intel 432. 45-66 - Charles H. Sauer:

Computational Algorithms for State-Dependent Queueing Networks. 67-92
Volume 1, Number 2, May 1983
- Derek L. Eager, Kenneth C. Sevcik:

Performance Bound Hierarchies for Queueing Networks. 99-115 - Subhash C. Agrawal, Jeffrey P. Buzen:

The Aggregate Server Method for Analyzing Serialization Delays in Computer System. 116-143 - K. Mani Chandy, Jayadev Misra, Laura M. Haas:

Distributed Deadlock Detection. 144-156 - Peter R. Cappello, Kenneth Steiglitz:

A VLSI Layout for a Pipelined Dadda Multiplier. 157-174 - Manuel Blum:

How to Exchange (Secret) Keys. 175-193
Volume 1, Number 3, August 1983
- Tsutomu Hoshino, Toshio Kawai, Tomonori Shirakawa, Jun'ichi Higashino, Akira Yamaoka, Hachidai Ito, Takashi Sato, Kazuo Sawada:

PACS: A Parallel Microprocessor Array for Scientific Calculations. 195-221 - Richard D. Schlichting, Fred B. Schneider:

Fail-Stop Processors: An Approach to Designing Fault-Tolerant Computing Systems. 222-238 - Selim G. Akl, Peter D. Taylor:

Cryptographic Solution to a Problem of Access Control in a Hierarchy. 239-248 - R. Kenneth Bauer, Thomas A. Berson, Richard J. Feiertag:

A Key Distribution Protocol Using Event Markers. 249-255 - Richard A. Kemmerer:

Shared Resource Matrix Methodology: An Approach to Identifying Storage and Timing Channels. 256-277
Volume 1, Number 4, November 1983
- William D. Strecker:

Transient Behavior of Cache Memories. 281-293 - Hiroshi Kobayashi, Mario Gerla:

Optimal Routing in Closed Queuing Networks. 294-310 - Lansing Sloan:

Mechanisms that Enforce Bounds on Packet Lifetimes. 311-330 - A. Udaya Shankar, Simon S. Lam:

An HDLC Protocol Specification and Its Verification Using Image Protocols. 331-368

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














