


Остановите войну!
for scientists:


default search action
ACM Transactions on Computer Systems (TOCS), Volume 8
Volume 8, Number 1, February 1990
- Michael D. Schroeder, Michael Burrows:
Performance of Firefly RPC. 1-17 - Michael Burrows, Martín Abadi, Roger M. Needham:
A Logic of Authentication. 18-36 - Brian N. Bershad, Thomas E. Anderson, Edward D. Lazowska
, Henry M. Levy:
Lightweight Remote Procedure Call. 37-55 - David P. Anderson, Ron Kuivila:
A System for Computer Music Performance. 56-82
Volume 8, Number 2, May 1990
- Stephen E. Deering, David R. Cheriton:
Multicast Routing in Datagram Internetworks and Extended LANs. 85-110 - Karsten Schwan, Win Bo:
"Topologies" - Distributed Objects on Multicomputers. 111-157 - K. K. Ramakrishnan, Raj Jain:
A Binary Feedback Scheme for Congestion Avoidance in Computer Networks. 158-181
Volume 8, Number 3, August 1990
- Glenn S. Benson, Ian F. Akyildiz, William F. Appelbe:
A Formal Protection Model of Security in Centralized, Parallel, and Distributed Systems. 183-213 - Richard P. King:
Disk Arm Movement in Anticipation of Future Requests. 214-229 - Chad L. Mitchell, Michael J. Flynn:
The Effects of Processor Architecture on Instruction Memory Traffic. 230-250
Volume 8, Number 4, November 1990
- Reinhard Gotzhein, Gregor von Bochmann:
Deriving Protocol Specifications from Service Specifications Including Parameters. 255-283 - Keith Marzullo:
Tolerating Failures of Continuous-Valued Sensors. 284-304 - Leslie Lamport:
Concurrent Reading and Writing of Clocks. 305-310 - Germán S. Goldszmidt, Shaula Yemini, Shmuel Katz:
High-Level Language Debugging for Concurrent Programs. 311-336

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.