


Остановите войну!
for scientists:


default search action
ACM Transactions on Computer Systems (TOCS), Volume 2
Volume 2, Number 1, February 1984
- Michael D. Schroeder, Andrew Birrell, Roger M. Needham:
Experience with Grapevine: The Growth of a Distributed System. 3-23 - Bruce G. Lindsay, Laura M. Haas, C. Mohan, Paul F. Wilms, Robert A. Yost:
Computation and Communication in R*: A Distributed Database Manager. 24-38 - Andrew Birrell, Bruce Jay Nelson:
Implementing Remote Procedure Calls. 39-59 - Simon Y. Berkovich, Colleen Roe Wilson:
A Computer Communication Technique Using Content-Induced Transaction Overlap. 60-77 - Hisao Kameda:
Optimality of a Central Processor Scheduling Policy for Processing a Job Stream. 78-90
Volume 2, Number 2, May 1984
- Marco Ajmone Marsan, Gianni Conte, Gianfranco Balbo:
A Class of Generalized Stochastic Petri Nets for the Performance Evaluation of Multiprocessor Systems. 93-122 - Asser N. Tantawi
, Manfred Ruschitzka:
Performance Analysis of Checkpointing Strategies. 123-144 - Fred B. Schneider:
Byzantine Generals in Action: Implementing Fail-Stop Processors. 145-154 - James W. Stamos:
Static Grouping of Small Objects to Enhance Performance of a Paged Virtual Memory. 155-180
Volume 2, Number 3, August 1984
- Marshall K. McKusick, William N. Joy, Samuel J. Leffler, Robert S. Fabry:
A Fast File System for UNIX. 181-197 - Carl E. Landwehr, Constance L. Heitmeyer, John D. McLean:
A Security Model for Military Message Systems. 198-222 - Peter M. Schwarz, Alfred Z. Spector:
Synchronizing Shared Abstract Types. 223-250 - Jo-Mei Chang, Nicholas F. Maxemchuk:
Reliable Broadcast Protocols. 251-273
Volume 2, Number 4, November 1984
- Jerome H. Saltzer, David P. Reed, David D. Clark:
End-To-End Arguments in System Design. 277-288 - James E. Smith:
Decoupled Access/Execute Computer Architectures. 289-308 - Walter F. Tichy:
The String-to-String Correction Problem with Block Moves. 309-321 - Raphael Rom:
Ordering Subscribers on Cable Networks. 322-334 - Raymond M. Bryant, Anthony E. Krzesinski, M. Seetha Lakshmi, K. Mani Chandy:
The MVA Priority Approximation. 335-359

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.