Author of the publication

A Locking Protocol for Resource Coordination in Distributed Databases (Abstract).

, , and . SIGMOD Conference, page 2. ACM, (1978)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enabling Secure Ubiquitous Interactions., , , , , and . Middleware Workshops, page 76-80. PUC-Rio, (2003)Frigate: a user-extensible OO file system., and . IEEE Concurrency, 6 (4): 26-35 (1998)Specification and Verification of the UCLA Unix Security Kernel (Extended Abstract)., , and . SOSP, page 64-65. ACM, (1979)long version: CACM 23(2).The Ficus Replicated File System (Abstract)., , , and . ACM SIGOPS Oper. Syst. Rev., 26 (2): 26 (1992)Saving portable computer battery power through remote process execution., , , and . ACM SIGMOBILE Mob. Comput. Commun. Rev., 2 (1): 19-26 (1998)Vision, issues, and architecture for nomadic computing and communications., , , and . IEEE Wirel. Commun., 2 (6): 14-27 (1995)Measuring the Quality of Service of Optimistic Replication., , , , , and . ECOOP Workshops, volume 1543 of Lecture Notes in Computer Science, page 319-320. Springer, (1998)Primarily Disconnected Operation: Experiences with Ficus., , , and . Workshop on the Management of Replicated Data, page 2-5. IEEE Computer Society Press, (1992)Report on the programming language Euclid., , , , and . ACM SIGPLAN Notices, 12 (2): 1-79 (1977)A Model for Verification of Data Security in Operating Systems., and . Commun. ACM, 21 (9): 737-749 (1978)