The SCEAS System
Navigation Menu

Journals in DBLP

Operating Systems Review
1988, volume: 22, number: 3

  1. Carole B. Hogan
    Protection Imperfect: The Security of Some Computing Environments. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1988, v:22, n:3, pp:7-27 [Journal]
  2. Jonathan M. Smith
    A Survey of Process Migration Mechanisms. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1988, v:22, n:3, pp:28-40 [Journal]
  3. Anthony J. Dos Reis
    A Note on ben-Ari's Concurrent Programming System. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1988, v:22, n:3, pp:41- [Journal]
  4. David Hemmendinger
    A Correct Implementation of General Semaphores. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1988, v:22, n:3, pp:42-44 [Journal]
  5. Roger M. Needham, Michael Burrows
    Locks in Distributed Systems - Observations. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1988, v:22, n:3, pp:44- [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002