The SCEAS System
Navigation Menu

Journals in DBLP

Operating Systems Review
1999, volume: 33, number: 3

  1. Siaw-Lynn Ng
    Comments on ``On the Security of Three-Party Cryptographic Protocs'' by Xu, Zhang and Zhu. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1999, v:33, n:3, pp:5-6 [Journal]
  2. David Kotz, Robert S. Gray
    Mobile Agents and the Future of the Internet. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1999, v:33, n:3, pp:7-13 [Journal]
  3. Mahadev Satyanarayanan, Jason Flinn, Kevin R. Walker
    Visual Proxy: Exploiting OS Customizations without Application Source Code. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1999, v:33, n:3, pp:14-18 [Journal]
  4. Jong-Hyeon Lee
    The Big Brother Ballot. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1999, v:33, n:3, pp:19-25 [Journal]
  5. Danai Patiyoot, S. J. Shepherd
    Modeling and Evaluation of security induced delays in Wireless ATM Networks. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1999, v:33, n:3, pp:26-31 [Journal]
  6. Hai Jin
    On-the-fly Reconstruction of Failed Disk in RAID. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1999, v:33, n:3, pp:32-42 [Journal]
  7. Sung-Il Kang, Kihyun Pyun, Heung-Kyu Lee
    Performance Evaluation of Non-preemptive Policies for Scheduling Readers and Writers. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1999, v:33, n:3, pp:43-61 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002