The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Butler W. Lampson: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Butler W. Lampson
    Atomic Transactions. [Citation Graph (18, 0)][DBLP]
    Advanced Course: Distributed Systems, 1980, pp:246-265 [Conf]
  2. Butler W. Lampson
    A Note on the Confinement Problem. [Citation Graph (8, 0)][DBLP]
    Commun. ACM, 1973, v:16, n:10, pp:613-615 [Journal]
  3. Stephen R. Kimbleton, Pearl Y. Wang, Butler W. Lampson
    Applications and Protocols. [Citation Graph (3, 0)][DBLP]
    Advanced Course: Distributed Systems, 1980, pp:308-370 [Conf]
  4. Butler W. Lampson, David B. Lomet
    A New Presumed Commit Optimization for Two Phase Commit. [Citation Graph (3, 5)][DBLP]
    VLDB, 1993, pp:630-640 [Conf]
  5. Butler W. Lampson, David D. Redell
    Experience with Processes and Monitors in Mesa. [Citation Graph (3, 0)][DBLP]
    Commun. ACM, 1980, v:23, n:2, pp:105-117 [Journal]
  6. Ralph L. London, John V. Guttag, James J. Horning, Butler W. Lampson, James G. Mitchell, Gerald J. Popek
    Proof Rules for the Programming Language Euclid. [Citation Graph (2, 0)][DBLP]
    Acta Inf., 1978, v:10, n:, pp:1-26 [Journal]
  7. Martín Abadi, Michael Burrows, Butler W. Lampson, Gordon D. Plotkin
    A Calculus for Access Control in Distributed Systems. [Citation Graph (2, 0)][DBLP]
    ACM Trans. Program. Lang. Syst., 1993, v:15, n:4, pp:706-734 [Journal]
  8. Butler W. Lampson
    Designing a Global Name Service. [Citation Graph (1, 0)][DBLP]
    PODC, 1986, pp:1-10 [Conf]
  9. Butler W. Lampson, Robert F. Sproull
    An Open Operating System for a Single-User Machine. [Citation Graph (1, 0)][DBLP]
    SOSP, 1979, pp:98-105 [Conf]
  10. Andrew Birrell, Butler W. Lampson, Roger M. Needham, Michael D. Schroeder
    A Global Authentication Service without Global Trust. [Citation Graph (1, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1986, pp:223-230 [Conf]
  11. Butler W. Lampson
    Ethernet, Pup and Violet. [Citation Graph (0, 0)][DBLP]
    Advanced Course: Distributed Systems, 1980, pp:446-485 [Conf]
  12. Michael Burrows, Charles Jerian, Butler W. Lampson, Timothy Mann
    On-Line Data Compression in a Log-Structured File System. [Citation Graph (0, 0)][DBLP]
    ASPLOS, 1992, pp:2-9 [Conf]
  13. Butler W. Lampson
    Fast Procedure Calls. [Citation Graph (0, 0)][DBLP]
    ASPLOS, 1982, pp:66-76 [Conf]
  14. Butler W. Lampson, Nancy A. Lynch, Jørgen F. Søgaard-Andersen
    At-Most-Once Message Delivery. A Case Study in Algorithm Verification. [Citation Graph (0, 0)][DBLP]
    CONCUR, 1992, pp:317-324 [Conf]
  15. Martín Abadi, Michael Burrows, Butler W. Lampson, Gordon D. Plotkin
    A Calculus for Access Control in Distributed Systems. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1991, pp:1-23 [Conf]
  16. Butler W. Lampson, Nancy A. Lynch, Jørgen F. Søgaard-Andersen
    Correctness of At-Most-Once Message Delivery Protocols. [Citation Graph (0, 0)][DBLP]
    FORTE, 1993, pp:385-400 [Conf]
  17. Martín Abadi, Butler W. Lampson, Jean-Jacques Lévy
    Analysis and Caching of Dependencies. [Citation Graph (0, 0)][DBLP]
    ICFP, 1996, pp:83-91 [Conf]
  18. Butler W. Lampson
    Redundancy and Robustness in Memory Protection. [Citation Graph (0, 0)][DBLP]
    IFIP Congress, 1974, pp:128-132 [Conf]
  19. Butler W. Lampson, Venkatachary Srinivasan, George Varghese
    IP Lookups Using Multiway and Multicolumn Search. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 1998, pp:1248-1256 [Conf]
  20. Butler W. Lampson, Kenneth A. Pier
    A Processor for a High-Performance Personal Computer. [Citation Graph (0, 0)][DBLP]
    ISCA, 1980, pp:146-160 [Conf]
  21. Butler W. Lampson, Kenneth A. Pier
    A Processor for a High-Performance Personal Computer. [Citation Graph (0, 0)][DBLP]
    25 Years ISCA: Retrospectives and Reprints, 1998, pp:180-194 [Conf]
  22. Gerald J. Popek, James J. Horning, Butler W. Lampson, James G. Mitchell, Ralph L. London
    Notes on the Design of Euclid. [Citation Graph (0, 0)][DBLP]
    Language Design for Reliable Software, 1977, pp:11-18 [Conf]
  23. Butler W. Lampson
    Lazy and Speculative Execution in Computer Systems. [Citation Graph (0, 0)][DBLP]
    OPODIS, 2006, pp:1-2 [Conf]
  24. Butler W. Lampson
    An open operating system for a single-user machine. [Citation Graph (0, 0)][DBLP]
    Symposium on Operating Systems, 1974, pp:208-217 [Conf]
  25. Ralph L. London, John V. Guttag, James J. Horning, Butler W. Lampson, James G. Mitchell, Gerald J. Popek
    Proof Rules for the Programming Language Euclid. [Citation Graph (0, 0)][DBLP]
    Program Construction, 1978, pp:133-163 [Conf]
  26. Butler W. Lampson
    Interconnecting Computers: Architecture, Technology, and Economics. [Citation Graph (0, 0)][DBLP]
    Programming Languages and System Architectures, 1994, pp:1-20 [Conf]
  27. Butler W. Lampson
    The ABCD's of Paxos. [Citation Graph (0, 0)][DBLP]
    PODC, 2001, pp:13- [Conf]
  28. Butler W. Lampson, Eric E. Schmidt
    Practical Use of a Polymorphic Applicative Language. [Citation Graph (0, 0)][DBLP]
    POPL, 1983, pp:237-255 [Conf]
  29. Butler W. Lampson, James G. Mitchell, E. H. Satterthwhaite
    On the transfer of control between contexts. [Citation Graph (0, 0)][DBLP]
    Symposium on Programming, 1974, pp:181-203 [Conf]
  30. Rod M. Burstall, Butler W. Lampson
    A Kernel Language for Abstract Data Types and Modules. [Citation Graph (0, 0)][DBLP]
    Semantics of Data Types, 1984, pp:1-50 [Conf]
  31. Andrew Birrell, Butler W. Lampson, Roger M. Needham, Michael D. Schroeder
    Current work on authentication. [Citation Graph (0, 0)][DBLP]
    ACM SIGOPS European Workshop, 1986, pp:- [Conf]
  32. Butler W. Lampson
    Hints for Computer System Design. [Citation Graph (0, 0)][DBLP]
    SOSP, 1983, pp:33-48 [Conf]
  33. Butler W. Lampson, Martín Abadi, Michael Burrows, Edward Wobber
    Authentication in Distributed Systems: Theory and Practice. [Citation Graph (0, 0)][DBLP]
    SOSP, 1991, pp:165-182 [Conf]
  34. Butler W. Lampson, David D. Redell
    Experience with Processes and Monitors in Mesa (Summary). [Citation Graph (0, 0)][DBLP]
    SOSP, 1979, pp:43-44 [Conf]
  35. Edward Wobber, Martín Abadi, Michael Burrows, Butler W. Lampson
    Authentication in the Taos Operating System. [Citation Graph (0, 0)][DBLP]
    SOSP, 1993, pp:256-269 [Conf]
  36. Martín Abadi, Michael Burrows, C. Kaufman, Butler W. Lampson
    Authentication and Delegation with Smart-cards. [Citation Graph (0, 0)][DBLP]
    TACS, 1991, pp:326-345 [Conf]
  37. Butler W. Lampson
    Gold and Fool's Gold: Successes, Failures, and Futures in Computer Systems Research. [Citation Graph (0, 0)][DBLP]
    USENIX Annual Technical Conference, General Track, 2006, pp:- [Conf]
  38. Butler W. Lampson
    How to Build a Highly Available System Using Consensus. [Citation Graph (0, 0)][DBLP]
    WDAG, 1996, pp:1-17 [Conf]
  39. Roberto De Prisco, Butler W. Lampson, Nancy A. Lynch
    Revisiting the Paxos Algorithm. [Citation Graph (0, 0)][DBLP]
    WDAG, 1997, pp:111-125 [Conf]
  40. L. Peter Deutsch, Butler W. Lampson
    An online editor. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1967, v:10, n:12, pp:793-799 [Journal]
  41. Paul G. Heckel, Butler W. Lampson
    A Terminal-Oriented Communication System. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1977, v:20, n:7, pp:486-494 [Journal]
  42. Butler W. Lampson, Howard E. Sturgis
    Reflections on an Operating System Design. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1976, v:19, n:5, pp:251-265 [Journal]
  43. Butler W. Lampson
    A scheduling philosophy for multiprocessing systems. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1968, v:11, n:5, pp:347-360 [Journal]
  44. David L. Tennenhouse, Butler W. Lampson, Sharon Eisner Gillett, Jennifer Steiner Klein
    Virtual Infrastructure: Putting Information Infrastructure on the Technology Curve. [Citation Graph (0, 0)][DBLP]
    Computer Networks and ISDN Systems, 1996, v:28, n:13, pp:1769-1790 [Journal]
  45. Paul England, Butler W. Lampson, John Manferdelli, Marcus Peinado, Bryan Willman
    A Trusted Open Platform. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2003, v:36, n:7, pp:55-62 [Journal]
  46. Butler W. Lampson
    Computer Security in the Real World. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2004, v:37, n:6, pp:37-46 [Journal]
  47. Butler W. Lampson, Rod M. Burstall
    Pebble, a Kernel Language for Modules and Abstract Data Types [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 1988, v:76, n:2/3, pp:278-346 [Journal]
  48. Butler W. Lampson
    Getting computers to understand. [Citation Graph (0, 0)][DBLP]
    J. ACM, 2003, v:50, n:1, pp:70-72 [Journal]
  49. Martín Abadi, Michael Burrows, C. Kaufman, Butler W. Lampson
    Authentification and Delegation with Smart-Cards. [Citation Graph (0, 0)][DBLP]
    Sci. Comput. Program., 1993, v:21, n:2, pp:93-113 [Journal]
  50. Butler W. Lampson
    Hints for Computer System Design. [Citation Graph (0, 0)][DBLP]
    IEEE Software, 1984, v:1, n:1, pp:11-28 [Journal]
  51. Douglas W. Clark, Butler W. Lampson, Kenneth A. Pier
    The Memory System of a High-Performance Personal Computer. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1981, v:30, n:10, pp:715-733 [Journal]
  52. Butler W. Lampson
    Gene McDaniel, Severo M. Ornstein: An Instruction Fetch Unit for a High-Performance Personal Conmputer. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1984, v:33, n:8, pp:712-730 [Journal]
  53. Roberto De Prisco, Butler W. Lampson, Nancy A. Lynch
    Revisiting the PAXOS algorithm. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2000, v:243, n:1-2, pp:35-91 [Journal]
  54. Butler W. Lampson, Martín Abadi, Michael Burrows, Edward Wobber
    Authentication in Distributed Systems: Theory and Practice. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Comput. Syst., 1992, v:10, n:4, pp:265-310 [Journal]
  55. Butler W. Lampson, Venkatachary Srinivasan, George Varghese
    IP lookups using multiway and multicolumn search. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 1999, v:7, n:3, pp:324-334 [Journal]

  56. Lazy and speculative execution in computer systems. [Citation Graph (, )][DBLP]


  57. Privacy and security - Usable security: how to get it. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.457secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002