The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Michael D. Schroeder: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Andrew Birrell, Roy Levin, Roger M. Needham, Michael D. Schroeder
    Grapevine: An Exercise in Distributed Computing. [Citation Graph (12, 0)][DBLP]
    Commun. ACM, 1982, v:25, n:4, pp:260-274 [Journal]
  2. Roger M. Needham, Michael D. Schroeder
    Using Encryption for Authentication in Large Networks of Computers. [Citation Graph (3, 0)][DBLP]
    Commun. ACM, 1978, v:21, n:12, pp:993-999 [Journal]
  3. Michael D. Schroeder, David K. Gifford, Roger M. Needham
    A Caching File System For a Programmer's Workstation. [Citation Graph (2, 0)][DBLP]
    SOSP, 1985, pp:25-34 [Conf]
  4. Michael D. Schroeder, Andrew Birrell, Roger M. Needham
    Experience with Grapevine: The Growth of a Distributed System [Citation Graph (2, 0)][DBLP]
    ACM Trans. Comput. Syst., 1984, v:2, n:1, pp:3-23 [Journal]
  5. Andy Hisgen, Andrew Birrell, Timothy Mann, Michael D. Schroeder, Garret Swart
    Availability and Consistency Tradeoffs in the Echo Distributed File System. [Citation Graph (1, 0)][DBLP]
    Workshop on Workstation Operating Systems, 1989, pp:49-54 [Conf]
  6. Andrew Birrell, Roy Levin, Roger M. Needham, Michael D. Schroeder
    Gravevine: An Exercise in Distributed Computing (summary). [Citation Graph (1, 0)][DBLP]
    SOSP, 1981, pp:178-179 [Conf]
  7. Michael D. Schroeder, David D. Clark, Jerome H. Saltzer
    The Multics Kernel Design Project. [Citation Graph (1, 0)][DBLP]
    SOSP, 1977, pp:43-56 [Conf]
  8. Andrew Birrell, Butler W. Lampson, Roger M. Needham, Michael D. Schroeder
    A Global Authentication Service without Global Trust. [Citation Graph (1, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1986, pp:223-230 [Conf]
  9. Andy Hisgen, Andrew Birrell, Charles Jerian, Timothy Mann, Michael D. Schroeder, Garret Swart
    Granularity and Semantic Level of Replication in the Echo Distributed File System. [Citation Graph (1, 0)][DBLP]
    Workshop on the Management of Replicated Data, 1990, pp:2-4 [Conf]
  10. Michael D. Schroeder, Jerome H. Saltzer
    A Hardware Architecture for Implementing Protection Rings. [Citation Graph (1, 0)][DBLP]
    Commun. ACM, 1972, v:15, n:3, pp:157-170 [Journal]
  11. Michael D. Schroeder, Michael Burrows
    Performance of Firefly RPC. [Citation Graph (1, 0)][DBLP]
    ACM Trans. Comput. Syst., 1990, v:8, n:1, pp:1-17 [Journal]
  12. Michael D. Schroeder
    On the Impact of Academic Distributed Systems Research on Industrial Practice. [Citation Graph (0, 0)][DBLP]
    Future Directions in Distributed Computing, 2003, pp:11-16 [Conf]
  13. Andrew Birrell, Butler W. Lampson, Roger M. Needham, Michael D. Schroeder
    Current work on authentication. [Citation Graph (0, 0)][DBLP]
    ACM SIGOPS European Workshop, 1986, pp:- [Conf]
  14. Michael D. Schroeder
    Autonomy or interdependence in distributed systems? [Citation Graph (0, 0)][DBLP]
    ACM SIGOPS European Workshop, 1988, pp:- [Conf]
  15. Michael D. Schroeder
    Software clercks. [Citation Graph (0, 0)][DBLP]
    ACM SIGOPS European Workshop, 1992, pp:- [Conf]
  16. Thomas L. Rodeheffer, Michael D. Schroeder
    Automatic Reconfiguration in Autonet. [Citation Graph (0, 0)][DBLP]
    SOSP, 1991, pp:183-197 [Conf]
  17. Michael D. Schroeder
    Engineering a Security Kernel for Multics. [Citation Graph (0, 0)][DBLP]
    SOSP, 1975, pp:25-32 [Conf]
  18. Michael D. Schroeder, Michael Burrows
    Performance of Firefly RPC. [Citation Graph (0, 0)][DBLP]
    SOSP, 1989, pp:83-90 [Conf]
  19. Michael D. Schroeder, Andrew Birrell, Roger M. Needham
    Experience with Grapevine: The Growth of a Distributed System (Summary). [Citation Graph (0, 0)][DBLP]
    SOSP, 1983, pp:141-142 [Conf]
  20. Michael D. Schroeder, Jerome H. Saltzer
    A Hardware Architecture for Implementing Protection Rings (Abstract). [Citation Graph (0, 0)][DBLP]
    SOSP, 1971, pp:42-54 [Conf]
  21. David K. Gifford, Roger M. Needham, Michael D. Schroeder
    The Cedar System. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1988, v:31, n:3, pp:288-298 [Journal]
  22. Michael D. Schroeder, Andrew Birrell, Michael Burrows, Hal Murray, Roger M. Needham, Thomas L. Rodeheffer, Edwin H. Satterthwaite, Charles P. Thacker
    Autonet: A High-Speed, Self-Configuring Local Area Network Using Point-to-Point Links. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1991, v:9, n:8, pp:1318-1335 [Journal]
  23. Roger M. Needham, Michael D. Schroeder
    Authentication Revisited. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1987, v:21, n:1, pp:7- [Journal]
  24. Michael D. Schroeder
    How Can We Make Operating Systems Research More Effective? [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1992, v:26, n:1, pp:12- [Journal]
  25. Michael D. Schroeder
    Systems work at Microsoft Research. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2007, v:41, n:2, pp:1-2 [Journal]

Search in 0.003secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002