From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Hardware Architecture for Implementing Protection Rings (Abstract)., и . SOSP, стр. 42-54. ACM, (1971)Operating System Review 6(1-2).Why a Ring?, , и . Comput. Networks, (1983)Active Networking and End-To-End Arguments, , и . (1998)Needed: a systematic structuring paradigm for distributed data.. ACM SIGOPS European Workshop, ACM, (1992)The protection of information in computer systems., и . Proc. IEEE, 63 (9): 1278-1308 (1975)A Simple Linear Model of Demand Paging Performance.. Commun. ACM, 17 (4): 181-186 (1974)The instrumentation of multics., и . SOSP, стр. 167-174. ACM, (1969)End-To-End Arguments in System Design, , и . ACM Trans. Comput. Syst., 2 (4): 277-288 (1984)Manuscript Typing and Editing. стр. AH.9.01. MIT Press, 2 издание, (1965)Protection and the Control of Information Sharing in Multics.. Commun. ACM, 17 (7): 388-402 (1974)