Journals in DBLP
John A. Trono , William E. Taylor Further comments on "A correct and unrestrictive implementation of general semaphores". [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 2000, v:34, n:3, pp:5-10 [Journal ] Baowen Xu Tagged Semaphores. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 2000, v:34, n:3, pp:11-15 [Journal ] Pengjun Pei , Guohua Cui , Kun Peng On a Session Key Compromise Problem in [KC95] protocol. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 2000, v:34, n:3, pp:16-18 [Journal ] Yongxing Sun , Xinmei Wang An approach to finding the attacks on the cryptographic protocols. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 2000, v:34, n:3, pp:19-28 [Journal ] Li Ji , Li Tianning , Guihai Chen , Xie Lie , C. L. Wang Strategies Optimization and Integration in DSM. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 2000, v:34, n:3, pp:29-39 [Journal ] Kamil Iskra , Frank van der Linden , Zeger W. Hendrikse , Benno J. Overeinder , G. Dick van Albada , Peter M. A. Sloot The implementation of Dynamite - an environment for migrating PVM tasks. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 2000, v:34, n:3, pp:40-55 [Journal ] Chris J. Mitchell Making serial number based authentication robust against loss of state. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 2000, v:34, n:3, pp:56-59 [Journal ] Abdelmadjid Bouabdallah , Christian Laforest A Distributed token/based Algorithm for the Dynamic Resource Allocation Problem. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 2000, v:34, n:3, pp:60-68 [Journal ] G. Alan Creak , Robert Sheehan A Top-Down Operating System Course. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 2000, v:34, n:3, pp:69-80 [Journal ]