


Остановите войну!
for scientists:


default search action
ACM Transactions on Computer Systems (TOCS), Volume 24
Volume 24, Number 1, February 2006
- Angelos D. Keromytis, Jason L. Wright
, Theo de Raadt, Matthew Burnside:
Cryptography as an operating system service: A case study. 1-38 - Cristian Coarfa, Peter Druschel, Dan S. Wallach:
Performance analysis of TLS Web servers. 39-69 - Haifeng Yu, Amin Vahdat:
The costs and limits of availability for replicated services. 70-113
Volume 24, Number 2, May 2006
- David Moore, Colleen Shannon, Douglas J. Brown, Geoffrey M. Voelker, Stefan Savage:
Inferring Internet denial-of-service activity. 115-139 - Philip Holman, James H. Anderson:
Locking under Pfair scheduling. 140-174 - Albert M. Lai, Jason Nieh:
On the performance of wide-area thin-client computing. 175-209
Volume 24, Number 3, August 2006
- Manish Vachharajani, Neil Vachharajani, David A. Penry, Jason A. Blome, Sharad Malik, David I. August:
The Liberty Simulation Environment: A deliberate approach to high-level system modeling. 211-249 - Kenneth C. Barr
, Krste Asanovic:
Energy-aware lossless data compression. 250-291 - Wanghong Yuan, Klara Nahrstedt:
Energy-efficient CPU scheduling for multimedia applications. 292-331
Volume 24, Number 4, November 2006
- Michael M. Swift, Muthukaruppan Annamalai, Brian N. Bershad, Henry M. Levy:
Recovering device drivers. 333-360 - Edmund B. Nightingale, Peter M. Chen, Jason Flinn:
Speculative execution in a distributed file system. 361-392 - Junfeng Yang, Paul Twohey, Dawson R. Engler, Madanlal Musuvathi:
Using model checking to find serious file system errors. 393-423

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.