-
1
-
-
0009771101
-
Announcement of weakness in the secure hash standard
-
National Institute of Standards and Technology (NIST), April
-
FIPS 180-1. Announcement of weakness in the secure hash standard. Technical report, National Institute of Standards and Technology (NIST), April 1994.
-
(1994)
Technical Report
-
-
FIPS 180-11
-
4
-
-
0031269854
-
Disco: Running commodity operating systems on scalable multiprocessors
-
November
-
E. Bugnion, S. Devine, and M. Rosenblum. Disco: Running commodity operating systems on scalable multiprocessors. ACM Transactions on Computer Systems, 15(4):412-447, November 1997.
-
(1997)
ACM Transactions On Computer Systems
, vol.15
, Issue.4
, pp. 412-447
-
-
Bugnion, E.1
Devine, S.2
Rosenblum, M.3
-
7
-
-
84978405567
-
-
http://www.connectix.cong.
-
-
-
-
10
-
-
4644284659
-
Legion: An operating system for wide-area computing
-
Dept. of Computer Science, University of Virginia, March
-
A. Grimshaw, A. Ferrari, E Knabe, and M. Humphrey. Legion: An operating system for wide-area computing. Technical Report CS-99-12, Dept. of Computer Science, University of Virginia, March 1999.
-
(1999)
Technical Report CS-99-12
-
-
Grimshaw, A.1
Ferrari, A.2
Knabe, F.3
Humphrey, M.4
-
11
-
-
84978386737
-
-
IA-32 Intel architecture software developer's manual
-
IA-32 Intel architecture software developer's manual volumes 1-3. http://developer.intel.com/design/pentium4/manuals/.
-
, vol.1-3
-
-
-
13
-
-
0031096753
-
Mobile computing with the Rover toolkit
-
March
-
A. Joseph, J. Tauber, and M. Kaashoek. Mobile computing with the Rover toolkit. IEEE Transactions on Computers, 46(3):337-352, March 1997.
-
(1997)
IEEE Transactions On Computers
, vol.46
, Issue.3
, pp. 337-352
-
-
Joseph, A.1
Tauber, J.2
Kaashoek, M.3
-
14
-
-
0023960862
-
Finegrained mobility in the Emerald system
-
February
-
E. Jul, H. Levy, N. Hutchinson, and A. Black. Finegrained mobility in the Emerald system. ACM Transaction on Computer Systems, 6(1):109-133, February 1988.
-
(1988)
ACM Transaction On Computer Systems
, vol.6
, Issue.1
, pp. 109-133
-
-
Jul, E.1
Levy, H.2
Hutchinson, N.3
Black, A.4
-
18
-
-
23044500563
-
Cluster on demand
-
Duke University, May
-
J. Moore and J. Chase. Cluster on demand. Technical report, Duke University, May 2002.
-
(2002)
Technical Report
-
-
Moore, J.1
Chase, J.2
-
21
-
-
85084159983
-
Libckpt: Transparent checkpointing under Unix
-
January
-
J. Plank, M. Beck, G. Kingsley, and K. Li. Libckpt: Transparent checkpointing under Unix. In Proceedings of the USEN1X Winter 1995 Technical Conference, pages 213-224, January 1995.
-
(1995)
Proceedings of the USEN1X Winter 1995 Technical Conference
, pp. 213-224
-
-
Plank, J.1
Beck, M.2
Kingsley, G.3
Li, K.4
-
23
-
-
0030832833
-
Dummynet: A simple approach to the evaluation of network protocols
-
Jan
-
L. Rizzo. Dummynet: a simple approach to the evaluation of network protocols. ACM Computer Communication Review, 27(1):31-41, Jan. 1997.
-
(1997)
ACM Computer Communication Review
, vol.27
, Issue.1
, pp. 31-41
-
-
Rizzo, L.1
-
28
-
-
84978404947
-
-
GSX server, white paper
-
"GSX server", white paper. http://www.vmware.com/pdf/gsx-whitepaper.pdf.
-
-
-
|