Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reading Chess., and . IEEE Trans. Pattern Anal. Mach. Intell., 12 (6): 552-559 (1990)The Use of Name Spaces in Plan 9., , , , and . ACM SIGOPS Oper. Syst. Rev., 27 (2): 72-76 (1993)Tributes to Tony Scherzer., and . J. Int. Comput. Games Assoc., 18 (1): 37-38 (1995)6-Piece Endgames.. J. Int. Comput. Games Assoc., 19 (4): 215-226 (1996)New Results for KNPKB and KNPKN Endgames.. J. Int. Comput. Games Assoc., 14 (1): 17 (1991)Systems Architecture, Design, Engineering, and Verification - The Practice in Research and Research in Practice., , , , and . ACM-TURING, page 6:1. ACM, (2012)Password Security - A Case History., and . Commun. ACM, 22 (11): 594-597 (1979)The UNIX Time-Sharing System (Reprint)., and . Commun. ACM, 26 (1): 84-89 (1983)The UNIX Time-Sharing System (Abstract)., and . SOSP, page 27. ACM, (1973)Operating System Review 7(4).Unix and Beyond: An Interview with Ken Thompson., , , and . Computer, 32 (5): 58-64 (1999)