The SCEAS System
Navigation Menu

Journals in DBLP

Operating Systems Review
2002, volume: 36, number: 4

  1. Hong Han, Xianliang Lu, Jun Lu, Bo Chen, Ren Li Yong
    Data mining aided signature discovery in network-based intrusion detection system. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2002, v:36, n:4, pp:7-13 [Journal]
  2. Her-Tyan Yeh, Hung-Min Sun
    Simple authenticated key agreement protocol resistant to password guessing attacks. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2002, v:36, n:4, pp:14-22 [Journal]
  3. Cheng-Chi Lee, Li-Hua Li, Min-Shiang Hwang
    A remote user authentication scheme using hash functions. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2002, v:36, n:4, pp:23-29 [Journal]
  4. Niklas Borselius, Chris J. Mitchell, Aaron Wilson
    On the value of threshold signatures. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2002, v:36, n:4, pp:30-35 [Journal]
  5. Chao Jin, Weimin Zheng, Feng Zhou, Yinghui Wu
    A distributed persistent object store for scalable service. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2002, v:36, n:4, pp:36-49 [Journal]
  6. Lu Jun, Xianliang Lu, Luo Guangchun, Han Hong, Zhou Xu
    STFS: a novel file system for efficient small writes. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2002, v:36, n:4, pp:50-54 [Journal]
  7. Nian-Min Yao, Ming-Yang Zheng, Jiu-bin Ju
    Pipeline: a new architecture of high performance servers. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2002, v:36, n:4, pp:55-64 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002