From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The use of a writable control memory in a multiprogramming environment.. MICRO, стр. 62-65. ACM, (1972)Could It Have Been Predicted?. Commun. ACM, 34 (10): 19-21 (1991)Domains of Protection and the Management of Processes., и . Comput. J., 17 (2): 117-120 (1974)On preserving the integrity of data bases.. Comput. J., 15 (3): 191-194 (1972)Slave Memories and Segmentation.. IEEE Trans. Computers, 20 (6): 674-675 (1971)The Second Decade of Computer Development.. Comput. J., 1 (3): 98-105 (1958)Security Management and Protection - A Personal Approach.. Comput. J., 27 (1): 3-7 (1984)Pure and applied programming.. ACM National Meeting (Toronto), стр. 121-123. ACM, (1952)Microprogramming.. AIEE-ACM-IRE Computer Conference (Eastern), стр. 18-20. ACM, (1958)The Growth of Interest in Microprogramming: A Literature Survey.. ACM Comput. Surv., 1 (3): 139-145 (1969)