default search action
Operating Systems Review, Volume 39, 2005
Volume 39, Number 1, January 2005
- Shihyu Chou, Eric Jui-Lin Lu, Yi-Hui Chen:
X-RDR: a role-based delegation processor for web-based information systems. 4-21 - Jia Song:
Segment-based proxy caching for distributed cooperative media content servers. 22-33 - Chuan Zhan, Xianliang Lu, Meng-shu Hou, Xu Zhou:
A LVQ-based neural network anti-spam email approach. 34-39 - Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati, Deepak B. Phatak:
Hierarchical key management scheme using polynomial interpolation. 40-47 - Ting Yi Chang, Min-Shiang Hwang, Wei-Pang Yang:
A new multi-stage secret sharing scheme using one-way function. 48-55 - Meng-shu Hou, Xianliang Lu, Xu Zhou, Chuan Zhan:
A trust model of p2p system based on confirmation theory. 56-62 - Xu Zhou, Xianliang Lu, Meng-shu Hou, Chuan Zhan:
A speed-based adaptive dynamic parallel downloading technique. 63-69 - Ya-Fen Chang, Chin-Chen Chang:
An efficient authentication protocol for mobile satellite communication systems. 70-84 - Wei-Chi Ku, Min-Hung Chiang, Shen-Tien Chang:
Weaknesses of Yoon-Ryu-Yoo's hash-based password authentication scheme. 85-89 - Wei-Chi Ku, Shuai-Min Chen:
Cryptanalysis of a flexible remote user authentication scheme using smart cards. 90-96
Volume 39, Number 2, April 2005
- Edsger W. Dijkstra:
My recollections of operating system design. 4-40 - Cliff B. Jones, David B. Lomet, Alexander B. Romanovsky, Gerhard Weikum, Alan D. Fekete, Marie-Claude Gaudel, Henry F. Korth, Rogério de Lemos, J. Eliot B. Moss, Ravi Rajwar, Krithi Ramamritham, Brian Randell, Luís E. T. Rodrigues:
The atomic manifesto: a story in four quarks. 41-46 - Gertrude Neuman Levine:
The classification of deadlock prevention and avoidance is erroneous. 47-50 - Rushikesh K. Joshi, Subash Rajaa:
Modeling VP operation: the Diwali Festival Problem. 51-53 - Marisa Gil, Ruben Pinilla:
Thread coloring: a scheduler proposal from user to hardware threads. 54-70 - Robert Steinke, Micah Clark, Elihu McMahon:
A new pattern for flexible worker threads with in-place consumption message queues. 71-73 - Yair Wiseman:
ARC based superpaging. 74-78 - Catherine Dodge, Cynthia E. Irvine, Thuy D. Nguyen:
A study of initialization in Linux and OpenBSD. 79-93 - Kuo-Feng Hwang, I-En Liao:
Two attacks on a user friendly remote authentication scheme with smart cards. 94-96
Volume 39, Number 3, July 2005
- Yair Wiseman, Karsten Schwan, Patrick M. Widener:
Efficient end to end data exchange using configurable compression. 4-23 - Zhiqiang Lin, Chao Wang, Bing Mao, Li Xie:
A policy flexible architecture for secure operating system. 24-33 - Jorge Herrerías Guerrero, Roberto Gómez Cárdenas:
An example of communication between security tools: iptables - snort. 34-43 - Guangchun Luo, Xianliang Lu, Ting Yang:
The research on consistency of space/time of IDS. 44-51 - Yan Tang, Tao Wang, Xiaoming Li:
The design and implementation of LilyTask in shared memory. 52-63 - A. Vijay Srinivas, D. Janaki Ram:
A model for characterizing the scalability of distributed systems. 64-71 - Youhui Zhang, Dongsheng Wong, Weimin Zheng:
User-level checkpoint and recovery for LAM/MPI. 72-81 - Kuo-Qin Yan, Shu-Ching Wang:
The bounds of faulty components on consensus with dual failure modes. 82-89 - Yi-Hwa Chen, Jinn-ke Jan:
Enhancement of digital signature with message recovery using self-certified public keys and its variants. 90-96
Volume 39, Number 4, October 2005
- Keith Loepere:
Stackable thread mechanisms. 4-17 - Joseph M. Gwinn:
Quality-of-Service versus Realtime. 18-22 - Vijay Shivshanker Gupta:
Trust and accountability issues in scalable invalidation-based web cache consistency. 23-36 - Mais Nijim, Tao Xie, Xiao Qin:
Performance analysis of an admission controller for CPU- and I/O-intensive applications in self-managing computer systems. 37-45 - Chien-Fu Cheng, Shu-Ching Wang, Tyne Liang:
Multi-agent schema of Mobile IP protocol for mobile environment. 46-65 - Chih-Hung Wang, Yan-Sheng Kuo:
An efficient contract signing protocol using the aggregate signature scheme to protect signers' privacy and promote reliability. 66-79 - Shu-Chin Wang, Mao-Lun Chiang, Kuo-Qin Yan, Kuen-Fang Jea:
Streets of consensus under unknown unreliable network. 80-96
Volume 39, Number 5, December 2005
- Andrew Herbert, Kenneth P. Birman:
Proceedings of the 20th ACM Symposium on Operating Systems Principles 2005, SOSP 2005, Brighton, UK, October 23-26, 2005. ACM 2005, ISBN 1-59593-079-5 [contents]
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.