Search the dblp DataBase
Butler W. Lampson :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Butler W. Lampson Atomic Transactions. [Citation Graph (18, 0)][DBLP ] Advanced Course: Distributed Systems, 1980, pp:246-265 [Conf ] Butler W. Lampson A Note on the Confinement Problem. [Citation Graph (8, 0)][DBLP ] Commun. ACM, 1973, v:16, n:10, pp:613-615 [Journal ] Stephen R. Kimbleton , Pearl Y. Wang , Butler W. Lampson Applications and Protocols. [Citation Graph (3, 0)][DBLP ] Advanced Course: Distributed Systems, 1980, pp:308-370 [Conf ] Butler W. Lampson , David B. Lomet A New Presumed Commit Optimization for Two Phase Commit. [Citation Graph (3, 5)][DBLP ] VLDB, 1993, pp:630-640 [Conf ] Butler W. Lampson , David D. Redell Experience with Processes and Monitors in Mesa. [Citation Graph (3, 0)][DBLP ] Commun. ACM, 1980, v:23, n:2, pp:105-117 [Journal ] Ralph L. London , John V. Guttag , James J. Horning , Butler W. Lampson , James G. Mitchell , Gerald J. Popek Proof Rules for the Programming Language Euclid. [Citation Graph (2, 0)][DBLP ] Acta Inf., 1978, v:10, n:, pp:1-26 [Journal ] Martín Abadi , Michael Burrows , Butler W. Lampson , Gordon D. Plotkin A Calculus for Access Control in Distributed Systems. [Citation Graph (2, 0)][DBLP ] ACM Trans. Program. Lang. Syst., 1993, v:15, n:4, pp:706-734 [Journal ] Butler W. Lampson Designing a Global Name Service. [Citation Graph (1, 0)][DBLP ] PODC, 1986, pp:1-10 [Conf ] Butler W. Lampson , Robert F. Sproull An Open Operating System for a Single-User Machine. [Citation Graph (1, 0)][DBLP ] SOSP, 1979, pp:98-105 [Conf ] Andrew Birrell , Butler W. Lampson , Roger M. Needham , Michael D. Schroeder A Global Authentication Service without Global Trust. [Citation Graph (1, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1986, pp:223-230 [Conf ] Butler W. Lampson Ethernet, Pup and Violet. [Citation Graph (0, 0)][DBLP ] Advanced Course: Distributed Systems, 1980, pp:446-485 [Conf ] Michael Burrows , Charles Jerian , Butler W. Lampson , Timothy Mann On-Line Data Compression in a Log-Structured File System. [Citation Graph (0, 0)][DBLP ] ASPLOS, 1992, pp:2-9 [Conf ] Butler W. Lampson Fast Procedure Calls. [Citation Graph (0, 0)][DBLP ] ASPLOS, 1982, pp:66-76 [Conf ] Butler W. Lampson , Nancy A. Lynch , Jørgen F. Søgaard-Andersen At-Most-Once Message Delivery. A Case Study in Algorithm Verification. [Citation Graph (0, 0)][DBLP ] CONCUR, 1992, pp:317-324 [Conf ] Martín Abadi , Michael Burrows , Butler W. Lampson , Gordon D. Plotkin A Calculus for Access Control in Distributed Systems. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1991, pp:1-23 [Conf ] Butler W. Lampson , Nancy A. Lynch , Jørgen F. Søgaard-Andersen Correctness of At-Most-Once Message Delivery Protocols. [Citation Graph (0, 0)][DBLP ] FORTE, 1993, pp:385-400 [Conf ] Martín Abadi , Butler W. Lampson , Jean-Jacques Lévy Analysis and Caching of Dependencies. [Citation Graph (0, 0)][DBLP ] ICFP, 1996, pp:83-91 [Conf ] Butler W. Lampson Redundancy and Robustness in Memory Protection. [Citation Graph (0, 0)][DBLP ] IFIP Congress, 1974, pp:128-132 [Conf ] Butler W. Lampson , Venkatachary Srinivasan , George Varghese IP Lookups Using Multiway and Multicolumn Search. [Citation Graph (0, 0)][DBLP ] INFOCOM, 1998, pp:1248-1256 [Conf ] Butler W. Lampson , Kenneth A. Pier A Processor for a High-Performance Personal Computer. [Citation Graph (0, 0)][DBLP ] ISCA, 1980, pp:146-160 [Conf ] Butler W. Lampson , Kenneth A. Pier A Processor for a High-Performance Personal Computer. [Citation Graph (0, 0)][DBLP ] 25 Years ISCA: Retrospectives and Reprints, 1998, pp:180-194 [Conf ] Gerald J. Popek , James J. Horning , Butler W. Lampson , James G. Mitchell , Ralph L. London Notes on the Design of Euclid. [Citation Graph (0, 0)][DBLP ] Language Design for Reliable Software, 1977, pp:11-18 [Conf ] Butler W. Lampson Lazy and Speculative Execution in Computer Systems. [Citation Graph (0, 0)][DBLP ] OPODIS, 2006, pp:1-2 [Conf ] Butler W. Lampson An open operating system for a single-user machine. [Citation Graph (0, 0)][DBLP ] Symposium on Operating Systems, 1974, pp:208-217 [Conf ] Ralph L. London , John V. Guttag , James J. Horning , Butler W. Lampson , James G. Mitchell , Gerald J. Popek Proof Rules for the Programming Language Euclid. [Citation Graph (0, 0)][DBLP ] Program Construction, 1978, pp:133-163 [Conf ] Butler W. Lampson Interconnecting Computers: Architecture, Technology, and Economics. [Citation Graph (0, 0)][DBLP ] Programming Languages and System Architectures, 1994, pp:1-20 [Conf ] Butler W. Lampson The ABCD's of Paxos. [Citation Graph (0, 0)][DBLP ] PODC, 2001, pp:13- [Conf ] Butler W. Lampson , Eric E. Schmidt Practical Use of a Polymorphic Applicative Language. [Citation Graph (0, 0)][DBLP ] POPL, 1983, pp:237-255 [Conf ] Butler W. Lampson , James G. Mitchell , E. H. Satterthwhaite On the transfer of control between contexts. [Citation Graph (0, 0)][DBLP ] Symposium on Programming, 1974, pp:181-203 [Conf ] Rod M. Burstall , Butler W. Lampson A Kernel Language for Abstract Data Types and Modules. [Citation Graph (0, 0)][DBLP ] Semantics of Data Types, 1984, pp:1-50 [Conf ] Andrew Birrell , Butler W. Lampson , Roger M. Needham , Michael D. Schroeder Current work on authentication. [Citation Graph (0, 0)][DBLP ] ACM SIGOPS European Workshop, 1986, pp:- [Conf ] Butler W. Lampson Hints for Computer System Design. [Citation Graph (0, 0)][DBLP ] SOSP, 1983, pp:33-48 [Conf ] Butler W. Lampson , Martín Abadi , Michael Burrows , Edward Wobber Authentication in Distributed Systems: Theory and Practice. [Citation Graph (0, 0)][DBLP ] SOSP, 1991, pp:165-182 [Conf ] Butler W. Lampson , David D. Redell Experience with Processes and Monitors in Mesa (Summary). [Citation Graph (0, 0)][DBLP ] SOSP, 1979, pp:43-44 [Conf ] Edward Wobber , Martín Abadi , Michael Burrows , Butler W. Lampson Authentication in the Taos Operating System. [Citation Graph (0, 0)][DBLP ] SOSP, 1993, pp:256-269 [Conf ] Martín Abadi , Michael Burrows , C. Kaufman , Butler W. Lampson Authentication and Delegation with Smart-cards. [Citation Graph (0, 0)][DBLP ] TACS, 1991, pp:326-345 [Conf ] Butler W. Lampson Gold and Fool's Gold: Successes, Failures, and Futures in Computer Systems Research. [Citation Graph (0, 0)][DBLP ] USENIX Annual Technical Conference, General Track, 2006, pp:- [Conf ] Butler W. Lampson How to Build a Highly Available System Using Consensus. [Citation Graph (0, 0)][DBLP ] WDAG, 1996, pp:1-17 [Conf ] Roberto De Prisco , Butler W. Lampson , Nancy A. Lynch Revisiting the Paxos Algorithm. [Citation Graph (0, 0)][DBLP ] WDAG, 1997, pp:111-125 [Conf ] L. Peter Deutsch , Butler W. Lampson An online editor. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1967, v:10, n:12, pp:793-799 [Journal ] Paul G. Heckel , Butler W. Lampson A Terminal-Oriented Communication System. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1977, v:20, n:7, pp:486-494 [Journal ] Butler W. Lampson , Howard E. Sturgis Reflections on an Operating System Design. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1976, v:19, n:5, pp:251-265 [Journal ] Butler W. Lampson A scheduling philosophy for multiprocessing systems. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1968, v:11, n:5, pp:347-360 [Journal ] David L. Tennenhouse , Butler W. Lampson , Sharon Eisner Gillett , Jennifer Steiner Klein Virtual Infrastructure: Putting Information Infrastructure on the Technology Curve. [Citation Graph (0, 0)][DBLP ] Computer Networks and ISDN Systems, 1996, v:28, n:13, pp:1769-1790 [Journal ] Paul England , Butler W. Lampson , John Manferdelli , Marcus Peinado , Bryan Willman A Trusted Open Platform. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 2003, v:36, n:7, pp:55-62 [Journal ] Butler W. Lampson Computer Security in the Real World. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 2004, v:37, n:6, pp:37-46 [Journal ] Butler W. Lampson , Rod M. Burstall Pebble, a Kernel Language for Modules and Abstract Data Types [Citation Graph (0, 0)][DBLP ] Inf. Comput., 1988, v:76, n:2/3, pp:278-346 [Journal ] Butler W. Lampson Getting computers to understand. [Citation Graph (0, 0)][DBLP ] J. ACM, 2003, v:50, n:1, pp:70-72 [Journal ] Martín Abadi , Michael Burrows , C. Kaufman , Butler W. Lampson Authentification and Delegation with Smart-Cards. [Citation Graph (0, 0)][DBLP ] Sci. Comput. Program., 1993, v:21, n:2, pp:93-113 [Journal ] Butler W. Lampson Hints for Computer System Design. [Citation Graph (0, 0)][DBLP ] IEEE Software, 1984, v:1, n:1, pp:11-28 [Journal ] Douglas W. Clark , Butler W. Lampson , Kenneth A. Pier The Memory System of a High-Performance Personal Computer. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 1981, v:30, n:10, pp:715-733 [Journal ] Butler W. Lampson Gene McDaniel, Severo M. Ornstein: An Instruction Fetch Unit for a High-Performance Personal Conmputer. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 1984, v:33, n:8, pp:712-730 [Journal ] Roberto De Prisco , Butler W. Lampson , Nancy A. Lynch Revisiting the PAXOS algorithm. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 2000, v:243, n:1-2, pp:35-91 [Journal ] Butler W. Lampson , Martín Abadi , Michael Burrows , Edward Wobber Authentication in Distributed Systems: Theory and Practice. [Citation Graph (0, 0)][DBLP ] ACM Trans. Comput. Syst., 1992, v:10, n:4, pp:265-310 [Journal ] Butler W. Lampson , Venkatachary Srinivasan , George Varghese IP lookups using multiway and multicolumn search. [Citation Graph (0, 0)][DBLP ] IEEE/ACM Trans. Netw., 1999, v:7, n:3, pp:324-334 [Journal ] Lazy and speculative execution in computer systems. [Citation Graph (, )][DBLP ] Privacy and security - Usable security: how to get it. [Citation Graph (, )][DBLP ] Search in 0.037secs, Finished in 0.042secs