Search the dblp DataBase
James Leslie Keedy :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
James Leslie Keedy Support for Objects in the MONADS Architecture. [Citation Graph (2, 0)][DBLP ] POS, 1989, pp:392-405 [Conf ] John Rosenberg , D. M. Koch , James Leslie Keedy A Capability-Based Massive Memory Computer. [Citation Graph (1, 0)][DBLP ] POS, 1989, pp:377-391 [Conf ] Mark Evered , Gisela Menger , James Leslie Keedy , Axel Schmolitzky Software Engineering Despite Object-Orientation. [Citation Graph (0, 0)][DBLP ] ACSC, 2000, pp:66-73 [Conf ] James Leslie Keedy , Karin Vosseberg Security in a Persistent Distributed Operating System. [Citation Graph (0, 0)][DBLP ] ARCS, 1992, pp:306-317 [Conf ] James Leslie Keedy A Memory Architecture for Object-Oriented Systems. [Citation Graph (0, 0)][DBLP ] Objektorientierte Software- und Hardwarearchitekturen, 1983, pp:238-250 [Conf ] James Leslie Keedy , John Rosenberg Architectural Support for Software in the Monads III Computer Design. [Citation Graph (0, 0)][DBLP ] GI Jahrestagung, 1982, pp:73-86 [Conf ] James Leslie Keedy Is distribution a genuine problem for persistent systems or is addressing the real problem ? [Citation Graph (0, 0)][DBLP ] HICSS (2), 1995, pp:695-0 [Conf ] James Leslie Keedy , Klaus Espenlaub , Gisela Menger , Axel Schmolitzky , Mark Evered Software Reuse in an Object Oriented Framework: Distinguishing Types from Implementations and Objects from Attributes. [Citation Graph (0, 0)][DBLP ] ICSR, 2000, pp:420-435 [Conf ] James Leslie Keedy , Christian Heinlein , Gisela Menger Reuse Variables: Reusing Code and State in Timor. [Citation Graph (0, 0)][DBLP ] ICSR, 2004, pp:205-214 [Conf ] James Leslie Keedy Paging and Small Segments: A Memory Management Model. [Citation Graph (0, 0)][DBLP ] IFIP Congress, 1980, pp:337-342 [Conf ] Edward F. Gehringer , James Leslie Keedy Tagged Architecture: How Compelling Are its Advantages? [Citation Graph (0, 0)][DBLP ] ISCA, 1985, pp:162-170 [Conf ] James Leslie Keedy , Gisela Menger , Christian Heinlein , Frans A. Henskens Qualifying Types Illustrated by Synchronisation Examples. [Citation Graph (0, 0)][DBLP ] NetObjectDays, 2002, pp:330-344 [Conf ] Mark Evered , James Leslie Keedy , Axel Schmolitzky , Gisela Menger How Well Do Inheritance Mechanisms Support Inheritance Concepts?. [Citation Graph (0, 0)][DBLP ] JMLC, 1997, pp:252-266 [Conf ] Karin Vosseberg , Peter Brössler , James Leslie Keedy A Base for Secure Object Oriented Environments. [Citation Graph (0, 0)][DBLP ] Security for Object-Oriented Systems, 1993, pp:43-54 [Conf ] James Leslie Keedy , Peter Brössler Implementing Databases in the MONADS Virtual Memory. [Citation Graph (0, 0)][DBLP ] POS, 1992, pp:318-338 [Conf ] John Rosenberg , James Leslie Keedy Object Management and Addressing in the MONADS Architecture. [Citation Graph (0, 0)][DBLP ] POS, 1987, pp:114-133 [Conf ] James Leslie Keedy Überlegungen zur Einführung von Bachelor- und Master-Graden für die Informatik an deutschen Universitäten. [Citation Graph (0, 0)][DBLP ] Informatik und Ausbildung, 1998, pp:258-267 [Conf ] Mark Evered , James Leslie Keedy , Gisela Menger , Axel Schmolitzky Genja - A New Proposal for Parameterised Types in Java. [Citation Graph (0, 0)][DBLP ] TOOLS (25), 1997, pp:181-195 [Conf ] James Leslie Keedy , Mark Evered , Axel Schmolitzky , Gisela Menger Attribute Types and Bracket Implementations. [Citation Graph (0, 0)][DBLP ] TOOLS (25), 1997, pp:325-339 [Conf ] Gisela Menger , James Leslie Keedy , Mark Evered , Axel Schmolitzky Collection Types and Implementations in Object-Oriented Software Libraries. [Citation Graph (0, 0)][DBLP ] TOOLS (26), 1998, pp:97-0 [Conf ] Axel Schmolitzky , Mark Evered , James Leslie Keedy , Gisela Menger How Can Covariance in Pragmatical Class Methods be Made Statically Type-Safe? [Citation Graph (0, 0)][DBLP ] TOOLS (32), 1999, pp:200-209 [Conf ] Neil Dunstan , James Leslie Keedy , John Rosenberg Support for Concurrent Programming on the MONADS-PC System. [Citation Graph (0, 0)][DBLP ] Australian Computer Journal, 1993, v:25, n:1, pp:1-6 [Journal ] James Leslie Keedy An Outline of the ICL 2900 Series System Architecture. [Citation Graph (0, 0)][DBLP ] Australian Computer Journal, 1977, v:9, n:2, pp:53-62 [Journal ] James Leslie Keedy On Structuring Operating Systems With Monitors. [Citation Graph (0, 0)][DBLP ] Australian Computer Journal, 1978, v:10, n:1, pp:23-27 [Journal ] James Leslie Keedy On the specification of Software Subsystems. [Citation Graph (0, 0)][DBLP ] Australian Computer Journal, 1979, v:11, n:4, pp:127-132 [Journal ] James Leslie Keedy On the Exportation of Variables. [Citation Graph (0, 0)][DBLP ] Australian Computer Journal, 1980, v:12, n:1, pp:23-27 [Journal ] James Leslie Keedy Virtual Memory. [Citation Graph (0, 0)][DBLP ] Australian Computer Journal, 1980, v:12, n:2, pp:63- [Journal ] James Leslie Keedy , I. Richards Software Engineering View of Files. [Citation Graph (0, 0)][DBLP ] Australian Computer Journal, 1982, v:14, n:2, pp:56-61 [Journal ] Bernd Freisleben , James Leslie Keedy Priority Semaphores. [Citation Graph (0, 0)][DBLP ] Comput. J., 1989, v:32, n:1, pp:24-28 [Journal ] James Leslie Keedy , Kotagiri Ramamohanarao , John Rosenberg On Implementing Semaphores with Sets. [Citation Graph (0, 0)][DBLP ] Comput. J., 1979, v:22, n:2, pp:146-150 [Journal ] James Leslie Keedy , John Rosenberg , Kotagiri Ramamohanarao On Synchronizing Readers and Writers with Semaphores. [Citation Graph (0, 0)][DBLP ] Comput. J., 1982, v:25, n:1, pp:121-125 [Journal ] John Rosenberg , James Leslie Keedy , David Abramson Addressing Mechanisms for Large Virtual Memories. [Citation Graph (0, 0)][DBLP ] Comput. J., 1992, v:35, n:4, pp:369-375 [Journal ] James Leslie Keedy , Bernd Freisleben On the Efficient Use of Semaphore Primitives. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1985, v:21, n:4, pp:199-205 [Journal ] James Leslie Keedy , Klaus Espenlaub , Christian Heinlein , Gisela Menger Qualifying Types with Bracket Methods in Timor. [Citation Graph (0, 0)][DBLP ] Journal of Object Technology, 2004, v:3, n:1, pp:101-121 [Journal ] James Leslie Keedy , Klaus Espenlaub , Christian Heinlein , Gisela Menger Call-out Bracket Methods in Timor. [Citation Graph (0, 0)][DBLP ] Journal of Object Technology, 2006, v:5, n:1, pp:51-67 [Journal ] James Leslie Keedy , Klaus Espenlaub , Christian Heinlein , Gisela Menger , Mark Evered Statically Qualified Types in Timor. [Citation Graph (0, 0)][DBLP ] Journal of Object Technology, 2005, v:4, n:7, pp:115-137 [Journal ] James Leslie Keedy , Klaus Espenlaub , Christian Heinlein , Gisela Menger , Frans A. Henskens , Michael Hannaford Support for Object Oriented Transactions in Timor. [Citation Graph (0, 0)][DBLP ] Journal of Object Technology, 2006, v:5, n:2, pp:103-124 [Journal ] James Leslie Keedy , Christian Heinlein , Gisela Menger Inheriting Multiple and Repeated Parts in Timor. [Citation Graph (0, 0)][DBLP ] Journal of Object Technology, 2004, v:3, n:10, pp:99-120 [Journal ] James Leslie Keedy , Christian Heinlein , Gisela Menger , Mark Evered Diamond Inheritance and Attribute Types in Timor. [Citation Graph (0, 0)][DBLP ] Journal of Object Technology, 2004, v:3, n:10, pp:121-142 [Journal ] James Leslie Keedy , Gisela Menger , Christian Heinlein Inheriting from a Common Abstract Ancestor in Timor. [Citation Graph (0, 0)][DBLP ] Journal of Object Technology, 2002, v:1, n:1, pp:81-106 [Journal ] James Leslie Keedy On Structuring Operating Systems With Monitors. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 1979, v:13, n:1, pp:5-9 [Journal ] James Leslie Keedy An Instruction Set for Evaluating Expressions. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 1983, v:32, n:5, pp:476-478 [Journal ] James Leslie Keedy , Klaus Espenlaub , Christian Heinlein , Gisela Menger Persistent Objects and Capabilities in Timor. [Citation Graph (0, 0)][DBLP ] Journal of Object Technology, 2007, v:6, n:4, pp:- [Journal ] Search in 0.072secs, Finished in 0.074secs