Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Report on the programming language Euclid., , , , and . ACM SIGPLAN Notices, 12 (2): 1-79 (1977)The Ficus Replicated File System (Abstract)., , , and . ACM SIGOPS Oper. Syst. Rev., 26 (2): 26 (1992)Enabling Secure Ubiquitous Interactions., , , , , and . Middleware Workshops, page 76-80. PUC-Rio, (2003)Specification and Verification of the UCLA Unix Security Kernel (Extended Abstract)., , and . SOSP, page 64-65. ACM, (1979)long version: CACM 23(2).Frigate: a user-extensible OO file system., and . IEEE Concurrency, 6 (4): 26-35 (1998)A Model for Verification of Data Security in Operating Systems., and . Commun. ACM, 21 (9): 737-749 (1978)Correctness in access control.. ACM Annual Conference, page 236-241. ACM, (1973)Primarily Disconnected Operation: Experiences with Ficus., , , and . Workshop on the Management of Replicated Data, page 2-5. IEEE Computer Society Press, (1992)Measuring the Quality of Service of Optimistic Replication., , , , , and . ECOOP Workshops, volume 1543 of Lecture Notes in Computer Science, page 319-320. Springer, (1998)Saving portable computer battery power through remote process execution., , , and . ACM SIGMOBILE Mob. Comput. Commun. Rev., 2 (1): 19-26 (1998)