Search dblp for Publications

export results for "toc:db/journals/sigops/sigops32.bht:"

 download as .bib file

@article{DBLP:journals/sigops/AndersonBCLMN98,
  author       = {Ross J. Anderson and
                  Francesco Bergadano and
                  Bruno Crispo and
                  Jong{-}Hyeon Lee and
                  Charalampos Manifavas and
                  Roger M. Needham},
  title        = {A New Family of Authentication Protocols},
  journal      = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume       = {32},
  number       = {4},
  pages        = {9--20},
  year         = {1998},
  url          = {https://doi.org/10.1145/302350.302353},
  doi          = {10.1145/302350.302353},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigops/AndersonBCLMN98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/BabaogluDMS98,
  author       = {{\"{O}}zalp Babaoglu and
                  Renzo Davoli and
                  Alberto Montresor and
                  Roberto Segala},
  title        = {System Support for Partition-Aware Network Applications},
  journal      = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume       = {32},
  number       = {1},
  pages        = {41--56},
  year         = {1998},
  url          = {https://doi.org/10.1145/280559.280567},
  doi          = {10.1145/280559.280567},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigops/BabaogluDMS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/Bordawekar98,
  author       = {Rajesh Bordawekar},
  title        = {A Case for Compositional File Systems (Extended Abstract)},
  journal      = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume       = {32},
  number       = {3},
  pages        = {72--80},
  year         = {1998},
  url          = {https://doi.org/10.1145/281258.281280},
  doi          = {10.1145/281258.281280},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigops/Bordawekar98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/Dimitoglou98,
  author       = {George Dimitoglou},
  title        = {Deadlocks and Methods for their Detection, Prevention and Recovery
                  in Modern Operating Systems},
  journal      = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume       = {32},
  number       = {3},
  pages        = {51--54},
  year         = {1998},
  url          = {https://doi.org/10.1145/281258.281273},
  doi          = {10.1145/281258.281273},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigops/Dimitoglou98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/Ellis98,
  author       = {Carla Schlatter Ellis},
  title        = {{SIGOPS} {README}},
  journal      = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume       = {32},
  number       = {1},
  pages        = {1--2},
  year         = {1998},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigops/Ellis98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/Faber98,
  author       = {Theodore Faber},
  title        = {Optimizing Throughput in a Workstation-based Network File System over
                  a High Bandwidth Local Area Network},
  journal      = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume       = {32},
  number       = {1},
  pages        = {29--40},
  year         = {1998},
  url          = {https://doi.org/10.1145/280559.280565},
  doi          = {10.1145/280559.280565},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigops/Faber98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/FeustelM98,
  author       = {Edward A. Feustel and
                  Terry Mayfield},
  title        = {The {DGSA:} Unmet Information Security Challenges for Operating System
                  Designers},
  journal      = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume       = {32},
  number       = {1},
  pages        = {3--22},
  year         = {1998},
  url          = {https://doi.org/10.1145/280559.280562},
  doi          = {10.1145/280559.280562},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigops/FeustelM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/GritzalisA98,
  author       = {Stefanos Gritzalis and
                  George Aggelis},
  title        = {Security Issues Surrounding Programming Languages for Mobile Code:
                  Java vs. Safe-Tcl},
  journal      = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume       = {32},
  number       = {2},
  pages        = {16--32},
  year         = {1998},
  url          = {https://doi.org/10.1145/506133.506137},
  doi          = {10.1145/506133.506137},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigops/GritzalisA98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/HaringLR98,
  author       = {G{\"{u}}nter Haring and
                  Christoph Lindemann and
                  Martin Reiser},
  title        = {International Workshop Performance Evaluation - Origins and Directions},
  journal      = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume       = {32},
  number       = {2},
  pages        = {2--3},
  year         = {1998},
  url          = {https://doi.org/10.1145/506133.506135},
  doi          = {10.1145/506133.506135},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigops/HaringLR98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/HeCZ98,
  author       = {Yanxiang He and
                  Donald H. Cooley and
                  Jianping Zhang},
  title        = {Planning Management of Multiagent-Based Distributed Open Computing
                  Environment Model},
  journal      = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume       = {32},
  number       = {1},
  pages        = {57--64},
  year         = {1998},
  url          = {https://doi.org/10.1145/280559.280569},
  doi          = {10.1145/280559.280569},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigops/HeCZ98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/JoyeY98,
  author       = {Marc Joye and
                  Sung{-}Ming Yen},
  title        = {ID-based Secret-Key Cryptography},
  journal      = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume       = {32},
  number       = {4},
  pages        = {33--39},
  year         = {1998},
  url          = {https://doi.org/10.1145/302350.302359},
  doi          = {10.1145/302350.302359},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigops/JoyeY98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/KangL98,
  author       = {Sung{-}Il Kang and
                  Heung{-}Kyu Lee},
  title        = {Analysis and Solution of Non-preemptive Policies for Scheduling Readers
                  and Writers},
  journal      = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume       = {32},
  number       = {3},
  pages        = {30--50},
  year         = {1998},
  url          = {https://doi.org/10.1145/281258.281268},
  doi          = {10.1145/281258.281268},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigops/KangL98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/Kuhnhauser98,
  author       = {Winfried E. K{\"{u}}hnhauser},
  title        = {A Classification of Interdomain Actions},
  journal      = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume       = {32},
  number       = {4},
  pages        = {47--61},
  year         = {1998},
  url          = {https://doi.org/10.1145/302350.302361},
  doi          = {10.1145/302350.302361},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigops/Kuhnhauser98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/Li98,
  author       = {Sanglu Lu and
                  Li Xie},
  title        = {A Scalable Load Balancing System for NOWs},
  journal      = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume       = {32},
  number       = {3},
  pages        = {55--63},
  year         = {1998},
  url          = {https://doi.org/10.1145/281258.281275},
  doi          = {10.1145/281258.281275},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigops/Li98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/Mahmood98,
  author       = {Amjad Mahmood},
  title        = {Task Allocation in Distributed Computing Systems},
  journal      = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume       = {32},
  number       = {3},
  pages        = {21--29},
  year         = {1998},
  url          = {https://doi.org/10.1145/281258.281265},
  doi          = {10.1145/281258.281265},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigops/Mahmood98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/MitchellY98,
  author       = {Chris J. Mitchell and
                  Chan Yeob Yeun},
  title        = {Fixing a Problem in the Helsinki Protocol},
  journal      = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume       = {32},
  number       = {4},
  pages        = {21--24},
  year         = {1998},
  url          = {https://doi.org/10.1145/302350.302356},
  doi          = {10.1145/302350.302356},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigops/MitchellY98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/PatiyootS98,
  author       = {Danai Patiyoot and
                  Simon J. Shepherd},
  title        = {Techniques for Authentication Protocols and Key Distribution on Wireless
                  {ATM} Networks},
  journal      = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume       = {32},
  number       = {4},
  pages        = {25--32},
  year         = {1998},
  url          = {https://doi.org/10.1145/302350.302357},
  doi          = {10.1145/302350.302357},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigops/PatiyootS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/PfitzmannW98,
  author       = {Birgit Pfitzmann and
                  Michael Waidner},
  title        = {How to Break Fraud-Detectable Key Recovery},
  journal      = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume       = {32},
  number       = {1},
  pages        = {23--28},
  year         = {1998},
  url          = {https://doi.org/10.1145/280559.280563},
  doi          = {10.1145/280559.280563},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigops/PfitzmannW98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/Robbins98,
  author       = {Steven Robbins},
  title        = {Introducing Empirical Investigation in Undergraduate Operating Systems},
  journal      = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume       = {32},
  number       = {4},
  pages        = {77--80},
  year         = {1998},
  url          = {https://doi.org/10.1145/302350.302366},
  doi          = {10.1145/302350.302366},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigops/Robbins98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/Ryan98,
  author       = {Stein J{\o}rgen Ryan},
  title        = {Synchronization in Portable Device Drivers},
  journal      = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume       = {32},
  number       = {4},
  pages        = {62--69},
  year         = {1998},
  url          = {https://doi.org/10.1145/302350.302363},
  doi          = {10.1145/302350.302363},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigops/Ryan98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/VivoVI98,
  author       = {Marco de Vivo and
                  Gabriela O. de Vivo and
                  Germinal Isern},
  title        = {Internet Security Attacks at the Basic Levels},
  journal      = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume       = {32},
  number       = {2},
  pages        = {4--15},
  year         = {1998},
  url          = {https://doi.org/10.1145/506133.506136},
  doi          = {10.1145/506133.506136},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigops/VivoVI98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/Voelker98,
  author       = {Geoffrey M. Voelker},
  title        = {Report on the {SIGMETRICS} '98/PERFORMANCE '98 Joint International
                  Conference on Measuerment and Modeling of Computer Systems},
  journal      = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume       = {32},
  number       = {4},
  pages        = {3--8},
  year         = {1998},
  url          = {https://doi.org/10.1145/302350.302352},
  doi          = {10.1145/302350.302352},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigops/Voelker98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/Wagner98,
  author       = {Bernhard Wagner},
  title        = {Controlling Cgi Programs},
  journal      = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume       = {32},
  number       = {4},
  pages        = {40--46},
  year         = {1998},
  url          = {https://doi.org/10.1145/302350.302360},
  doi          = {10.1145/302350.302360},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigops/Wagner98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/Waite98,
  author       = {William M. Waite},
  title        = {Is Operating Systems Review Obsolete?},
  journal      = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume       = {32},
  number       = {2},
  pages        = {1},
  year         = {1998},
  url          = {https://doi.org/10.1145/506133.506134},
  doi          = {10.1145/506133.506134},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigops/Waite98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/Waite98a,
  author       = {William M. Waite},
  title        = {Is Operating Systems Review Obsolete?},
  journal      = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume       = {32},
  number       = {3},
  pages        = {1--2},
  year         = {1998},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigops/Waite98a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/WeiJ98,
  author       = {Xiaohui Wei and
                  Jiubin Ju},
  title        = {{SFT:} {A} Consistent Checkpointing Algorithm With Shorter Freezing
                  Time},
  journal      = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume       = {32},
  number       = {4},
  pages        = {70--76},
  year         = {1998},
  url          = {https://doi.org/10.1145/302350.302364},
  doi          = {10.1145/302350.302364},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigops/WeiJ98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/XuZZ98,
  author       = {Shouhuai Xu and
                  Gendu Zhang and
                  Hong Zhu},
  title        = {On the Security of Three-Party Cryptographic Protocols},
  journal      = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume       = {32},
  number       = {3},
  pages        = {7--20},
  year         = {1998},
  url          = {https://doi.org/10.1145/281258.281261},
  doi          = {10.1145/281258.281261},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigops/XuZZ98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/YangS98,
  author       = {Zhonghua Yang and
                  Chengzheng Sun},
  title        = {{CORBA} For Hard Real Time Applications: Some Critical Issues},
  journal      = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume       = {32},
  number       = {3},
  pages        = {64--71},
  year         = {1998},
  url          = {https://doi.org/10.1145/281258.281277},
  doi          = {10.1145/281258.281277},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigops/YangS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics