-
1
-
-
0001916468
-
Mach: A new kernel foundation for unix development
-
Atlanta, Georgia, June
-
M. J. Accetta, R. V. Baron, W. Bolosky, D. B. Golub, R. F. Rashid, A. Tevanian, and M. W. Young. Mach: A New Kernel Foundation for Unix Development. In Proceedings of the USENIX Summer Conference, pages 93-112, Atlanta, Georgia, June 1986.
-
(1986)
Proceedings of the USENIX Summer Conference
, pp. 93-112
-
-
Accetta, M.J.1
Baron, R.V.2
Bolosky, W.3
Golub, D.B.4
Rashid, R.F.5
Tevanian, A.6
Young, M.W.7
-
2
-
-
84937029836
-
Optimizing unnecessary synchronization operations from Java programs
-
Venice, Italy, September
-
J. Aldrich, C. Chambers, E. G. Sirer and S. Eggers. Optimizing Unnecessary Synchronization Operations from Java Programs. In Static Analyses Symposium, pages 19-38, Venice, Italy, September 1999.
-
(1999)
Static Analyses Symposium
, pp. 19-38
-
-
Aldrich, J.1
Chambers, C.2
Sirer, E.G.3
Eggers, S.4
-
3
-
-
80054992065
-
Extensibility, safety and performance in the SPIN operating system
-
Copper Mountain Resort, Colorado, December
-
B. N. Bershad, S. Savage, P. Pardyak, E. G. Sirer, M. E. Fiuczynski, D. Becker, C. Chambers, and S. Eggers. Extensibility, Safety and Performance in the SPIN Operating System. In Proceedings of the Fifteenth ACM Symposium on Operating System Principles, pages 267-284, Copper Mountain Resort, Colorado, December 1995.
-
(1995)
Proceedings of the Fifteenth ACM Symposium on Operating System Principles
, pp. 267-284
-
-
Bershad, B.N.1
Savage, S.2
Pardyak, P.3
Sirer, E.G.4
Fiuczynski, M.E.5
Becker, D.6
Chambers, C.7
Eggers, S.8
-
4
-
-
0003551091
-
-
W3C Recommendation, World Wide Web Consortium, February
-
T. Bray, J. Paoli, and C. M. Sperberg-McQueen, editors. Extensible Markup Language (XML) 1.0. W3C Recommendation, World Wide Web Consortium, February 1998.
-
(1998)
Extensible Markup Language (XML) 1.0
-
-
Bray, T.1
Paoli, J.2
Sperberg-McQueen, C.M.3
-
5
-
-
0042484501
-
-
September
-
CERT Coordination Center. Weaknesses in Java Bytecode Verifier. September 1999. http://www.cert.org/advisories/CA-96.07.java-bytecode-verifier.html.
-
(1999)
Weaknesses in Java Bytecode Verifier
-
-
-
8
-
-
0005372913
-
Automatic program transformation with JOIE
-
New Orleans, Louisiana
-
G. A. Cohen, J. S. Chase, and D. L. Kaminsky. Automatic Program Transformation with JOIE. In Proceedings of the USENIX 1998 Annual Technical Conference, pages 167-178, New Orleans, Louisiana, 1998.
-
(1998)
Proceedings of the USENIX 1998 Annual Technical Conference
, pp. 167-178
-
-
Cohen, G.A.1
Chase, J.S.2
Kaminsky, D.L.3
-
9
-
-
0012073784
-
JRes: A resource accounting interface for Java
-
Vancouver, Canada, October
-
G. Czajkowski and T. von Eicken. JRes: A Resource Accounting Interface for Java. In Proceedings of the OOPSLA '98 Conference on Object-Oriented Programming, Systems, Languages, and Applications, pages 21-35, Vancouver, Canada, October 1998.
-
(1998)
Proceedings of the OOPSLA '98 Conference on Object-Oriented Programming, Systems, Languages, and Applications
, pp. 21-35
-
-
Czajkowski, G.1
Von Eicken, T.2
-
10
-
-
0037974167
-
Java security: Web browers and beyond
-
In D. E. Denning and P. J. Denning, editors, ACM Press, October
-
D. Dean, E. W. Feiten, D. S. Wallach, and D. Belfanz. Java Security: Web Browers and Beyond. In D. E. Denning and P. J. Denning, editors, Internet Beseiged: Countering Cyberspace Scofflaws, pages 241-269. ACM Press, October 1997.
-
(1997)
Internet Beseiged: Countering Cyberspace Scofflaws
, pp. 241-269
-
-
Dean, D.1
Feiten, E.W.2
Wallach, D.S.3
Belfanz, D.4
-
12
-
-
0031539485
-
The inferno operating system
-
Winter
-
S. Dorward, R. Pike, D. L. Presotto, D. Ritchie, H. Trickey, and P. Winterbottom. The Inferno Operating System. Bell Labs Technical Journal, 2(1):5-18, Winter 1997.
-
(1997)
Bell Labs Technical Journal
, vol.2
, Issue.1
, pp. 5-18
-
-
Dorward, S.1
Pike, R.2
Presotto, D.L.3
Ritchie, D.4
Trickey, H.5
Winterbottom, P.6
-
13
-
-
84883516225
-
Exokernel: An operating system architecture for application-level resource management
-
Copper Mountain Resort, Colorado, December
-
D. R. Engler, M. F. Kaashoek, and J. O'Toole. Exokernel: An Operating System Architecture for Application-Level Resource Management. In Proceedings of the Fifteenth ACM Symposium on Operating System Principles, pages 251-266, Copper Mountain Resort, Colorado, December 1995.
-
(1995)
Proceedings of the Fifteenth ACM Symposium on Operating System Principles
, pp. 251-266
-
-
Engler, D.R.1
Kaashoek, M.F.2
O'Toole, J.3
-
16
-
-
0031542278
-
Cluster-based scalable network services
-
Saint-Malo, France, October
-
A. Fox, S. D. Gribble, Y. Chawathe, E. A. Brewer, and P. Gauthier. Cluster-Based Scalable Network Services. In Proceedings of the Sixteenth ACM Symposium on Operating Systems Principles, pages 78-91, Saint-Malo, France, October 1997.
-
(1997)
Proceedings of the Sixteenth ACM Symposium on Operating Systems Principles
, pp. 78-91
-
-
Fox, A.1
Gribble, S.D.2
Chawathe, Y.3
Brewer, E.A.4
Gauthier, P.5
-
17
-
-
0346246659
-
A type system for object initialization in the Java bytecode language
-
Vancouver, Canada, October
-
S. N. Freund and J. C. Mitchell. A Type System for Object Initialization in the Java Bytecode Language. In Proceedings of the Conference on Object-Oriented Programming, Systems, Languages, and Applications, pages 310-327, Vancouver, Canada, October 1998.
-
(1998)
Proceedings of the Conference on Object-Oriented Programming, Systems, Languages, and Applications
, pp. 310-327
-
-
Freund, S.N.1
Mitchell, J.C.2
-
19
-
-
0003313661
-
Java security: Present and near future
-
May/June
-
L. Gong. Java Security: Present and Near Future. IEEE Micro, 17(3):14-19, May/June 1997.
-
(1997)
IEEE Micro
, vol.17
, Issue.3
, pp. 14-19
-
-
Gong, L.1
-
21
-
-
84887507059
-
Going beyond the sandbox: An overview of the new security architecture in the Java development kit 1.2
-
Monterey, California, December
-
L. Gong, M. Mueller, L. Prafullchandra, and R. Schemers. Going Beyond the Sandbox: An Overview of the New Security Architecture in the Java Development Kit 1.2. In Proceedings of the USEN1X Symposium on Internet Technologies and Systems, pages 103-112, Monterey, California, December 1997.
-
(1997)
Proceedings of the USEN1X Symposium on Internet Technologies and Systems
, pp. 103-112
-
-
Gong, L.1
Mueller, M.2
Prafullchandra, L.3
Schemers, R.4
-
24
-
-
84976736522
-
Gprof: A call graph execution profiler
-
June
-
S. L. Graham, P. B. Kessler, and M. K. McKusick. gprof: A Call Graph Execution Profiler. In Proceedings of the SIGPLAN '82 Symposium on Compiler Construction, SIGPLAN Notices, 17(6): 120-126, June 1982.
-
(1982)
Proceedings of the SIGPLAN '82 Symposium on Compiler Construction, SIGPLAN Notices
, vol.17
, Issue.6
, pp. 120-126
-
-
Graham, S.L.1
Kessler, P.B.2
McKusick, M.K.3
-
25
-
-
84983009748
-
Providing policy-neutral and transparent access control in extensible systems
-
In J. Vitek and C. D. Jensen, editors, Springer
-
R. Grimm and B. N. Bershad. Providing Policy-Neutral and Transparent Access Control in Extensible Systems. In J. Vitek and C. D. Jensen, editors, Secure Internet Programming-Security Issues for Mobile and Distributed Objects, volume 1603 of Lecture Notes in Computer Science, pages 317-338, Springer, 1999.
-
(1999)
Secure Internet Programming-Security Issues for Mobile and Distributed Objects, Volume 1603 of Lecture Notes in Computer Science
, pp. 317-338
-
-
Grimm, R.1
Bershad, B.N.2
-
27
-
-
85008048174
-
The future of systems research
-
August
-
J. Hennessy. The Future of Systems Research. In IEEE Computer, pages 27-33, August 1999.
-
(1999)
IEEE Computer
, pp. 27-33
-
-
Hennessy, J.1
-
28
-
-
85029302433
-
-
Hewlett-Packard Company. Chai Products. http://www.hp.com/emso/products/.
-
Chai Products
-
-
-
29
-
-
0041482594
-
Merging NT and unix filesystem permissions
-
Seattle, Washington, August
-
D. Hitz, B. Allison, A. Borr, R. Hawley, and M. Muhlestein. Merging NT and Unix Filesystem Permissions. In Proceedings of the Second Usenix Windows NT Symposium, pages 87-95, Seattle, Washington, August 1998.
-
(1998)
Proceedings of the Second Usenix Windows NT Symposium
, pp. 87-95
-
-
Hitz, D.1
Allison, B.2
Borr, A.3
Hawley, R.4
Muhlestein, M.5
-
31
-
-
0041983631
-
-
July
-
Internet Software Consortium. Internet Host Domain Survey. July 1999, http://www.isc.org/.
-
(1999)
Internet Host Domain Survey
-
-
-
32
-
-
0347600810
-
Overlapping execution with transfer using non-strict execution for mobile programs
-
San Jose, California, October
-
C. Krintz, B. Calder, H. P. Lee and B. G. Zorn. Overlapping Execution with Transfer Using Non-Strict Execution for Mobile Programs. In the Eighth International Conference on Architectural Support for Programming Languages and Operating Systems, pages 159-169, San Jose, California, October 1998.
-
(1998)
The Eighth International Conference on Architectural Support for Programming Languages and Operating Systems
, pp. 159-169
-
-
Krintz, C.1
Calder, B.2
Lee, H.P.3
Zorn, B.G.4
-
33
-
-
0002179618
-
Protection
-
Princeton, Ney Jersey, March. Reprinted in Operating Systems Review, 8(1):18-24, January 1974
-
B. Lampson. Protection. In Proceedings of the Fifth Princeton Symposium on Information Sciences and Systems, pages 437-443, Princeton, Ney Jersey, March 1971. Reprinted in Operating Systems Review, 8(1):18-24, January 1974.
-
(1971)
Proceedings of the Fifth Princeton Symposium on Information Sciences and Systems
, pp. 437-443
-
-
Lampson, B.1
-
35
-
-
84984064460
-
Policy/mechanism separation in hydra
-
Austin, Texas, October
-
R. Levin, E. Cohen, W. Corwin, F. Pollack, and W. Wulf. Policy/Mechanism Separation in Hydra. In Proceedings of the Fifth ACM Symposium on Operating Systems Principles, pages 132-140, Austin, Texas, October 1975.
-
(1975)
Proceedings of the Fifth ACM Symposium on Operating Systems Principles
, pp. 132-140
-
-
Levin, R.1
Cohen, E.2
Corwin, W.3
Pollack, F.4
Wulf, W.5
-
37
-
-
0031682432
-
Secure execution of Java applets using a remote playground
-
Oakland, California, May
-
D. Malkhi, M. K. Reiter, and A. D. Rubin. Secure Execution of Java Applets using a Remote Playground. In Proceedings of the IEEE Symposium on Security and Privacy, pages 40-51, Oakland, California, May 1998.
-
(1998)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 40-51
-
-
Malkhi, D.1
Reiter, M.K.2
Rubin, A.D.3
-
40
-
-
85084163247
-
Providing policy control over object operations in a Mach based system
-
Salt Lake City, Utah, June
-
S. E. Minear. Providing Policy Control Over Object Operations in a Mach Based System. In Proceedings of the Fifth USENIX UNIX Security Symposium, pages 141-156, Salt Lake City, Utah, June 1995.
-
(1995)
Proceedings of the Fifth USENIX UNIX Security Symposium
, pp. 141-156
-
-
Minear, S.E.1
-
41
-
-
0005008274
-
Simple and flexible datagram access controls for unix-based gateways
-
Baltimore, Maryland, June
-
J. C. Mogul. Simple and Flexible Datagram Access Controls for Unix-based Gateways. In Proceedings of the Summer 1989 USENIX Conference, pages 203-221, Baltimore, Maryland, June 1989.
-
(1989)
Proceedings of the Summer 1989 USENIX Conference
, pp. 203-221
-
-
Mogul, J.C.1
-
45
-
-
0016082273
-
Formal requirements for virtualizable third generation architectures
-
July
-
G. J. Popek and R. P. Goldberg. Formal Requirements for Virtualizable Third Generation Architectures. In Communications of the ACM, 17(7):412-421, July 1974.
-
(1974)
Communications of the ACM
, vol.17
, Issue.7
, pp. 412-421
-
-
Popek, G.J.1
Goldberg, R.P.2
-
46
-
-
85094097306
-
Toba: Java for applications, A way ahead of time (WAT) compiler
-
Berkeley, California, June
-
T. A. Proebsting, G. Townsend, P. Bridges, J. H. Hartman, T. Newsham, and S. A. Watterson. Toba: Java for Applications, A Way Ahead of Time (WAT) Compiler. In Proceedings of the Third Conference on Object-Oriented Technologies and Systems, pages 41-53, Berkeley, California, June 1997.
-
(1997)
Proceedings of the Third Conference on Object-Oriented Technologies and Systems
, pp. 41-53
-
-
Proebsting, T.A.1
Townsend, G.2
Bridges, P.3
Hartman, J.H.4
Newsham, T.5
Watterson, S.A.6
-
47
-
-
0032312932
-
Change and adaptive maintenance in Java software systems
-
Honolulu, Hawaii, October
-
D. Rayside, S. Kerr and K. Kontogiannis. Change And Adaptive Maintenance in Java Software Systems. In Fifth Working Conference on Reverse Engineering, pages 10-19, Honolulu, Hawaii, October 1998.
-
(1998)
Fifth Working Conference on Reverse Engineering
, pp. 10-19
-
-
Rayside, D.1
Kerr, S.2
Kontogiannis, K.3
-
48
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
February
-
R. L. Rivest, A. Shamir, and L. Adleman. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 21(2): 120-126, February 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
50
-
-
0016555241
-
The protection of information in computer systems
-
September
-
J. H. Saltzer and M. D. Schroeder. The Protection of Information in Computer Systems. Proceedings of the IEEE, 63(9): 1278-1308, September 1975.
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
51
-
-
0042484465
-
-
Technical Report, Secure Computing Corporation, Roseville, Minnesota, June
-
Secure Computing Corporation. DTOS Lessons Learned Report. Technical Report DTOS CDRL A008, Secure Computing Corporation, Roseville, Minnesota, June 1997.
-
(1997)
DTOS Lessons Learned Report
-
-
-
53
-
-
0042484463
-
Java environments
-
April 7
-
L. Seltzer. Java Environments. PC Magazine, pages 137-141, April 7, 1998.
-
(1998)
PC Magazine
, pp. 137-141
-
-
Seltzer, L.1
-
54
-
-
0003276451
-
A practical approach for improving startup latency in Java applications
-
INRIA Technical Report, Grenoble, France, May
-
E. G. Sirer, A. J. Gregory and B. N. Bershad. A Practical Approach for Improving Startup Latency in Java Applications. In Workshop on Compiler Support for Systems Software, INRIA Technical Report #0228, pages 47-55, Grenoble, France, May 1999.
-
(1999)
Workshop on Compiler Support for Systems Software
, pp. 47-55
-
-
Sirer, E.G.1
Gregory, A.J.2
Bershad, B.N.3
-
56
-
-
85029308934
-
-
Naperville, EL, September
-
Spyglass, Inc. Software Development Interface. Naperville, EL, September 1999. http://www.spyglass.com/products/smosaic/sdi/sdi-spec.html
-
(1999)
Software Development Interface
-
-
-
58
-
-
0003971971
-
-
White paper, Sun Microsystems, Palo Alto, California, September
-
Sun Microsystems. The Java HotSpot Performance Engine Architecture. White paper, Sun Microsystems, Palo Alto, California, September 1999. http://java.sun.com/products/hotspot/whitepaper.html.
-
(1999)
The Java HotSpot Performance Engine Architecture
-
-
-
59
-
-
0031232912
-
Programming languages for mobile code
-
September
-
T. Thorn. Programming Languages for Mobile Code. ACM Computing Surveys, pages 213-239, 29(3), September 1997.
-
(1997)
ACM Computing Surveys
, vol.29
, Issue.3
, pp. 213-239
-
-
Thorn, T.1
-
60
-
-
85029311720
-
-
Irvine. p-System: Description, Background, Utilities
-
University of California, Irvine. p-System: Description, Background, Utilities. http://www.ics.uci.edu/~archive/documentation/p-system/p-system.html.
-
-
-
-
61
-
-
0031542975
-
Extensible security architectures for Java
-
Saint-Malo, France, October
-
D. S. Wallach, D. Balfanz, D. Dean, and E. W. Feiten. Extensible Security Architectures for Java. In Proceedings of the Sixteenth ACM Symposium on Operating System Principles, pages 116-128, Saint-Malo, France, October 1997.
-
(1997)
Proceedings of the Sixteenth ACM Symposium on Operating System Principles
, pp. 116-128
-
-
Wallach, D.S.1
Balfanz, D.2
Dean, D.3
Feiten, E.W.4
-
62
-
-
0347760441
-
Embedded Java: An uncertain future
-
May
-
W. Webb. Embedded Java: An Uncertain Future. Electrical Design News, 44(10): 89-96, May 1999.
-
(1999)
Electrical Design News
, vol.44
, Issue.10
, pp. 89-96
-
-
Webb, W.1
-
63
-
-
84976653144
-
Some computer science problems in ubiquitous computing
-
July
-
M. Weiser. Some Computer Science Problems in Ubiquitous Computing. In Communications of the ACM, pages 74-84, July 1993.
-
(1993)
Communications of the ACM
, pp. 74-84
-
-
Weiser, M.1
|