Search dblp for Publications

export results for "toc:db/journals/tocs/tocs20.bht:"

 download as .bib file

@article{DBLP:journals/tocs/AndersonCV02,
  author       = {Darrell C. Anderson and
                  Jeffrey S. Chase and
                  Amin Vahdat},
  title        = {Interposed request routing for scalable network storage},
  journal      = {{ACM} Trans. Comput. Syst.},
  volume       = {20},
  number       = {1},
  pages        = {25--48},
  year         = {2002},
  url          = {https://doi.org/10.1145/505452.505454},
  doi          = {10.1145/505452.505454},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tocs/AndersonCV02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tocs/BurgessHSR02,
  author       = {Mark Burgess and
                  H{\aa}rek Haugerud and
                  Sigmund Straumsnes and
                  Trond Reitan},
  title        = {Measuring system normality},
  journal      = {{ACM} Trans. Comput. Syst.},
  volume       = {20},
  number       = {2},
  pages        = {125--160},
  year         = {2002},
  url          = {https://doi.org/10.1145/507052.507054},
  doi          = {10.1145/507052.507054},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tocs/BurgessHSR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tocs/CastroL02,
  author       = {Miguel Castro and
                  Barbara Liskov},
  title        = {Practical byzantine fault tolerance and proactive recovery},
  journal      = {{ACM} Trans. Comput. Syst.},
  volume       = {20},
  number       = {4},
  pages        = {398--461},
  year         = {2002},
  url          = {https://doi.org/10.1145/571637.571640},
  doi          = {10.1145/571637.571640},
  timestamp    = {Wed, 06 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tocs/CastroL02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tocs/FuKM02,
  author       = {Kevin Fu and
                  M. Frans Kaashoek and
                  David Mazi{\`{e}}res},
  title        = {Fast and secure distributed read-only file system},
  journal      = {{ACM} Trans. Comput. Syst.},
  volume       = {20},
  number       = {1},
  pages        = {1--24},
  year         = {2002},
  url          = {https://doi.org/10.1145/505452.505453},
  doi          = {10.1145/505452.505453},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tocs/FuKM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tocs/GangerEKBHP02,
  author       = {Gregory R. Ganger and
                  Dawson R. Engler and
                  M. Frans Kaashoek and
                  H{\'{e}}ctor M. Brice{\~{n}}o and
                  Russell Hunt and
                  Thomas Pinckney},
  title        = {Fast and flexible application-level networking on exokernel systems},
  journal      = {{ACM} Trans. Comput. Syst.},
  volume       = {20},
  number       = {1},
  pages        = {49--83},
  year         = {2002},
  url          = {https://doi.org/10.1145/505452.505455},
  doi          = {10.1145/505452.505455},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tocs/GangerEKBHP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tocs/HuKM02,
  author       = {Zhigang Hu and
                  Stefanos Kaxiras and
                  Margaret Martonosi},
  title        = {Let caches decay: reducing leakage energy via exploitation of cache
                  generational behavior},
  journal      = {{ACM} Trans. Comput. Syst.},
  volume       = {20},
  number       = {2},
  pages        = {161--190},
  year         = {2002},
  url          = {https://doi.org/10.1145/507052.507055},
  doi          = {10.1145/507052.507055},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tocs/HuKM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tocs/JimenezL02,
  author       = {Daniel A. Jim{\'{e}}nez and
                  Calvin Lin},
  title        = {Neural methods for dynamic branch prediction},
  journal      = {{ACM} Trans. Comput. Syst.},
  volume       = {20},
  number       = {4},
  pages        = {369--397},
  year         = {2002},
  url          = {https://doi.org/10.1145/571637.571639},
  doi          = {10.1145/571637.571639},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tocs/JimenezL02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tocs/KeidarSMD02,
  author       = {Idit Keidar and
                  Jeremy B. Sussman and
                  Keith Marzullo and
                  Danny Dolev},
  title        = {Moshe: {A} group membership service for WANs},
  journal      = {{ACM} Trans. Comput. Syst.},
  volume       = {20},
  number       = {3},
  pages        = {191--238},
  year         = {2002},
  url          = {https://doi.org/10.1145/566340.566341},
  doi          = {10.1145/566340.566341},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tocs/KeidarSMD02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tocs/Satyanarayanan02,
  author       = {Mahadev Satyanarayanan},
  title        = {The evolution of Coda},
  journal      = {{ACM} Trans. Comput. Syst.},
  volume       = {20},
  number       = {2},
  pages        = {85--124},
  year         = {2002},
  url          = {https://doi.org/10.1145/507052.507053},
  doi          = {10.1145/507052.507053},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tocs/Satyanarayanan02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tocs/YuV02,
  author       = {Haifeng Yu and
                  Amin Vahdat},
  title        = {Design and evaluation of a conit-based continuous consistency model
                  for replicated services},
  journal      = {{ACM} Trans. Comput. Syst.},
  volume       = {20},
  number       = {3},
  pages        = {239--282},
  year         = {2002},
  url          = {https://doi.org/10.1145/566340.566342},
  doi          = {10.1145/566340.566342},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tocs/YuV02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tocs/ZdancewicZNM02,
  author       = {Steve Zdancewic and
                  Lantian Zheng and
                  Nathaniel Nystrom and
                  Andrew C. Myers},
  title        = {Secure program partitioning},
  journal      = {{ACM} Trans. Comput. Syst.},
  volume       = {20},
  number       = {3},
  pages        = {283--328},
  year         = {2002},
  url          = {https://doi.org/10.1145/566340.566343},
  doi          = {10.1145/566340.566343},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tocs/ZdancewicZNM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tocs/ZhouSR02,
  author       = {Lidong Zhou and
                  Fred B. Schneider and
                  Robbert van Renesse},
  title        = {{COCA:} {A} secure distributed online certification authority},
  journal      = {{ACM} Trans. Comput. Syst.},
  volume       = {20},
  number       = {4},
  pages        = {329--368},
  year         = {2002},
  url          = {https://doi.org/10.1145/571637.571638},
  doi          = {10.1145/571637.571638},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tocs/ZhouSR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics