


default search action
ACM Transactions on Computer Systems (TOCS), Volume 2
Volume 2, Number 1, February 1984
- Michael D. Schroeder, Andrew Birrell, Roger M. Needham:

Experience with Grapevine: The Growth of a Distributed System. 3-23 - Bruce G. Lindsay, Laura M. Haas, C. Mohan, Paul F. Wilms, Robert A. Yost:

Computation and Communication in R*: A Distributed Database Manager. 24-38 - Andrew Birrell, Bruce Jay Nelson:

Implementing Remote Procedure Calls. 39-59 - Simon Y. Berkovich, Colleen Roe Wilson:

A Computer Communication Technique Using Content-Induced Transaction Overlap. 60-77 - Hisao Kameda:

Optimality of a Central Processor Scheduling Policy for Processing a Job Stream. 78-90
Volume 2, Number 2, May 1984
- Marco Ajmone Marsan, Gianni Conte, Gianfranco Balbo:

A Class of Generalized Stochastic Petri Nets for the Performance Evaluation of Multiprocessor Systems. 93-122 - Asser N. Tantawi

, Manfred Ruschitzka:
Performance Analysis of Checkpointing Strategies. 123-144 - Fred B. Schneider:

Byzantine Generals in Action: Implementing Fail-Stop Processors. 145-154 - James W. Stamos:

Static Grouping of Small Objects to Enhance Performance of a Paged Virtual Memory. 155-180
Volume 2, Number 3, August 1984
- Marshall K. McKusick, William N. Joy, Samuel J. Leffler, Robert S. Fabry:

A Fast File System for UNIX. 181-197 - Carl E. Landwehr, Constance L. Heitmeyer, John D. McLean:

A Security Model for Military Message Systems. 198-222 - Peter M. Schwarz, Alfred Z. Spector:

Synchronizing Shared Abstract Types. 223-250 - Jo-Mei Chang, Nicholas F. Maxemchuk:

Reliable Broadcast Protocols. 251-273
Volume 2, Number 4, November 1984
- Jerome H. Saltzer, David P. Reed, David D. Clark:

End-To-End Arguments in System Design. 277-288 - James E. Smith:

Decoupled Access/Execute Computer Architectures. 289-308 - Walter F. Tichy:

The String-to-String Correction Problem with Block Moves. 309-321 - Raphael Rom:

Ordering Subscribers on Cable Networks. 322-334 - Raymond M. Bryant, Anthony E. Krzesinski, M. Seetha Lakshmi, K. Mani Chandy:

The MVA Priority Approximation. 335-359

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














