Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/sigops/sigops32.bht:"
@article{DBLP:journals/sigops/AndersonBCLMN98, author = {Ross J. Anderson and Francesco Bergadano and Bruno Crispo and Jong{-}Hyeon Lee and Charalampos Manifavas and Roger M. Needham}, title = {A New Family of Authentication Protocols}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {32}, number = {4}, pages = {9--20}, year = {1998}, url = {https://doi.org/10.1145/302350.302353}, doi = {10.1145/302350.302353}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigops/AndersonBCLMN98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/BabaogluDMS98, author = {{\"{O}}zalp Babaoglu and Renzo Davoli and Alberto Montresor and Roberto Segala}, title = {System Support for Partition-Aware Network Applications}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {32}, number = {1}, pages = {41--56}, year = {1998}, url = {https://doi.org/10.1145/280559.280567}, doi = {10.1145/280559.280567}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigops/BabaogluDMS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/Bordawekar98, author = {Rajesh Bordawekar}, title = {A Case for Compositional File Systems (Extended Abstract)}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {32}, number = {3}, pages = {72--80}, year = {1998}, url = {https://doi.org/10.1145/281258.281280}, doi = {10.1145/281258.281280}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigops/Bordawekar98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/Dimitoglou98, author = {George Dimitoglou}, title = {Deadlocks and Methods for their Detection, Prevention and Recovery in Modern Operating Systems}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {32}, number = {3}, pages = {51--54}, year = {1998}, url = {https://doi.org/10.1145/281258.281273}, doi = {10.1145/281258.281273}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigops/Dimitoglou98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/Ellis98, author = {Carla Schlatter Ellis}, title = {{SIGOPS} {README}}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {32}, number = {1}, pages = {1--2}, year = {1998}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigops/Ellis98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/Faber98, author = {Theodore Faber}, title = {Optimizing Throughput in a Workstation-based Network File System over a High Bandwidth Local Area Network}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {32}, number = {1}, pages = {29--40}, year = {1998}, url = {https://doi.org/10.1145/280559.280565}, doi = {10.1145/280559.280565}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigops/Faber98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/FeustelM98, author = {Edward A. Feustel and Terry Mayfield}, title = {The {DGSA:} Unmet Information Security Challenges for Operating System Designers}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {32}, number = {1}, pages = {3--22}, year = {1998}, url = {https://doi.org/10.1145/280559.280562}, doi = {10.1145/280559.280562}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigops/FeustelM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/GritzalisA98, author = {Stefanos Gritzalis and George Aggelis}, title = {Security Issues Surrounding Programming Languages for Mobile Code: Java vs. Safe-Tcl}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {32}, number = {2}, pages = {16--32}, year = {1998}, url = {https://doi.org/10.1145/506133.506137}, doi = {10.1145/506133.506137}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigops/GritzalisA98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/HaringLR98, author = {G{\"{u}}nter Haring and Christoph Lindemann and Martin Reiser}, title = {International Workshop Performance Evaluation - Origins and Directions}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {32}, number = {2}, pages = {2--3}, year = {1998}, url = {https://doi.org/10.1145/506133.506135}, doi = {10.1145/506133.506135}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigops/HaringLR98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/HeCZ98, author = {Yanxiang He and Donald H. Cooley and Jianping Zhang}, title = {Planning Management of Multiagent-Based Distributed Open Computing Environment Model}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {32}, number = {1}, pages = {57--64}, year = {1998}, url = {https://doi.org/10.1145/280559.280569}, doi = {10.1145/280559.280569}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigops/HeCZ98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/JoyeY98, author = {Marc Joye and Sung{-}Ming Yen}, title = {ID-based Secret-Key Cryptography}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {32}, number = {4}, pages = {33--39}, year = {1998}, url = {https://doi.org/10.1145/302350.302359}, doi = {10.1145/302350.302359}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigops/JoyeY98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/KangL98, author = {Sung{-}Il Kang and Heung{-}Kyu Lee}, title = {Analysis and Solution of Non-preemptive Policies for Scheduling Readers and Writers}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {32}, number = {3}, pages = {30--50}, year = {1998}, url = {https://doi.org/10.1145/281258.281268}, doi = {10.1145/281258.281268}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigops/KangL98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/Kuhnhauser98, author = {Winfried E. K{\"{u}}hnhauser}, title = {A Classification of Interdomain Actions}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {32}, number = {4}, pages = {47--61}, year = {1998}, url = {https://doi.org/10.1145/302350.302361}, doi = {10.1145/302350.302361}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigops/Kuhnhauser98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/Li98, author = {Sanglu Lu and Li Xie}, title = {A Scalable Load Balancing System for NOWs}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {32}, number = {3}, pages = {55--63}, year = {1998}, url = {https://doi.org/10.1145/281258.281275}, doi = {10.1145/281258.281275}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigops/Li98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/Mahmood98, author = {Amjad Mahmood}, title = {Task Allocation in Distributed Computing Systems}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {32}, number = {3}, pages = {21--29}, year = {1998}, url = {https://doi.org/10.1145/281258.281265}, doi = {10.1145/281258.281265}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigops/Mahmood98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/MitchellY98, author = {Chris J. Mitchell and Chan Yeob Yeun}, title = {Fixing a Problem in the Helsinki Protocol}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {32}, number = {4}, pages = {21--24}, year = {1998}, url = {https://doi.org/10.1145/302350.302356}, doi = {10.1145/302350.302356}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigops/MitchellY98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/PatiyootS98, author = {Danai Patiyoot and Simon J. Shepherd}, title = {Techniques for Authentication Protocols and Key Distribution on Wireless {ATM} Networks}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {32}, number = {4}, pages = {25--32}, year = {1998}, url = {https://doi.org/10.1145/302350.302357}, doi = {10.1145/302350.302357}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigops/PatiyootS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/PfitzmannW98, author = {Birgit Pfitzmann and Michael Waidner}, title = {How to Break Fraud-Detectable Key Recovery}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {32}, number = {1}, pages = {23--28}, year = {1998}, url = {https://doi.org/10.1145/280559.280563}, doi = {10.1145/280559.280563}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigops/PfitzmannW98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/Robbins98, author = {Steven Robbins}, title = {Introducing Empirical Investigation in Undergraduate Operating Systems}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {32}, number = {4}, pages = {77--80}, year = {1998}, url = {https://doi.org/10.1145/302350.302366}, doi = {10.1145/302350.302366}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigops/Robbins98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/Ryan98, author = {Stein J{\o}rgen Ryan}, title = {Synchronization in Portable Device Drivers}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {32}, number = {4}, pages = {62--69}, year = {1998}, url = {https://doi.org/10.1145/302350.302363}, doi = {10.1145/302350.302363}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigops/Ryan98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/VivoVI98, author = {Marco de Vivo and Gabriela O. de Vivo and Germinal Isern}, title = {Internet Security Attacks at the Basic Levels}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {32}, number = {2}, pages = {4--15}, year = {1998}, url = {https://doi.org/10.1145/506133.506136}, doi = {10.1145/506133.506136}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigops/VivoVI98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/Voelker98, author = {Geoffrey M. Voelker}, title = {Report on the {SIGMETRICS} '98/PERFORMANCE '98 Joint International Conference on Measuerment and Modeling of Computer Systems}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {32}, number = {4}, pages = {3--8}, year = {1998}, url = {https://doi.org/10.1145/302350.302352}, doi = {10.1145/302350.302352}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigops/Voelker98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/Wagner98, author = {Bernhard Wagner}, title = {Controlling Cgi Programs}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {32}, number = {4}, pages = {40--46}, year = {1998}, url = {https://doi.org/10.1145/302350.302360}, doi = {10.1145/302350.302360}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigops/Wagner98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/Waite98, author = {William M. Waite}, title = {Is Operating Systems Review Obsolete?}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {32}, number = {2}, pages = {1}, year = {1998}, url = {https://doi.org/10.1145/506133.506134}, doi = {10.1145/506133.506134}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigops/Waite98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/Waite98a, author = {William M. Waite}, title = {Is Operating Systems Review Obsolete?}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {32}, number = {3}, pages = {1--2}, year = {1998}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigops/Waite98a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/WeiJ98, author = {Xiaohui Wei and Jiubin Ju}, title = {{SFT:} {A} Consistent Checkpointing Algorithm With Shorter Freezing Time}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {32}, number = {4}, pages = {70--76}, year = {1998}, url = {https://doi.org/10.1145/302350.302364}, doi = {10.1145/302350.302364}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigops/WeiJ98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/XuZZ98, author = {Shouhuai Xu and Gendu Zhang and Hong Zhu}, title = {On the Security of Three-Party Cryptographic Protocols}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {32}, number = {3}, pages = {7--20}, year = {1998}, url = {https://doi.org/10.1145/281258.281261}, doi = {10.1145/281258.281261}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigops/XuZZ98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/YangS98, author = {Zhonghua Yang and Chengzheng Sun}, title = {{CORBA} For Hard Real Time Applications: Some Critical Issues}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {32}, number = {3}, pages = {64--71}, year = {1998}, url = {https://doi.org/10.1145/281258.281277}, doi = {10.1145/281258.281277}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigops/YangS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.