Author of the publication

Primarily Disconnected Operation: Experiences with Ficus.

, , , and . Workshop on the Management of Replicated Data, page 2-5. IEEE Computer Society Press, (1992)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Saving portable computer battery power through remote process execution., , , and . ACM SIGMOBILE Mob. Comput. Commun. Rev., 2 (1): 19-26 (1998)Vision, issues, and architecture for nomadic computing and communications., , , and . IEEE Wirel. Commun., 2 (6): 14-27 (1995)The Ficus Replicated File System (Abstract)., , , and . ACM SIGOPS Oper. Syst. Rev., 26 (2): 26 (1992)Report on the programming language Euclid., , , , and . ACM SIGPLAN Notices, 12 (2): 1-79 (1977)Enabling Secure Ubiquitous Interactions., , , , , and . Middleware Workshops, page 76-80. PUC-Rio, (2003)Frigate: a user-extensible OO file system., and . IEEE Concurrency, 6 (4): 26-35 (1998)A Model for Verification of Data Security in Operating Systems., and . Commun. ACM, 21 (9): 737-749 (1978)On data secure computer networks.. SIGCOMM/SIGOPS Workshop on Interprocess Communications, page 59-62. ACM, (1975)Security kernels., , , , , , and . AFIPS National Computer Conference, volume 43 of AFIPS Conference Proceedings, page 973-980. AFIPS Press, (1974)Verifiable secure operating system software., and . AFIPS National Computer Conference, volume 43 of AFIPS Conference Proceedings, page 145-151. AFIPS Press, (1974)