From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Penetrating an Operating System: A Study of VM/370 Integrity., , и . IBM Syst. J., 15 (1): 102-116 (1976)Virtual machines and data security.. Workshop on Virtual Computer Systems, стр. 206-209. ACM, (1973)Java without the Coffee Breaks: A Nonintrusive Multiprocessor Garbage Collector., , , , и . PLDI, стр. 92-103. ACM, (2001)A Comparative Evaluation of Parallel Garbage Collector Implementations., , , и . LCPC, том 2624 из Lecture Notes in Computer Science, стр. 177-192. Springer, (2001)Whole-Stack Analysis and Optimization of Commercial Workloads on Server Systems., , , , , , , , , и 6 other автор(ы). NPC, том 3222 из Lecture Notes in Computer Science, стр. 5-8. Springer, (2004)Virtual Control Storage - Security Measures in VM/370.. IBM Syst. J., 18 (1): 93-110 (1979)Using virtualization for high availability and disaster recovery., , , , , , , , и . IBM J. Res. Dev., 53 (4): 8 (2009)The Jalapeño virtual machine., , , , , , , , , и 13 other автор(ы). IBM Syst. J., 39 (1): 211-238 (2000)Implementing Jalapeño in Java., , , , , , , , , и . OOPSLA, стр. 314-324. ACM, (1999)SIGPLAN Notices 34(10).