The persistent relevance of the local operating system to global applications
暂无分享,去创建一个
[1] Gerald J. Popek,et al. Verifiable secure operating system software , 1974, AFIPS '74.
[2] Larry L. Peterson,et al. Making paths explicit in the Scout operating system , 1996, OSDI '96.
[3] Mike Hibler,et al. Microkernels meet recursive virtual machines , 1996, OSDI '96.
[4] Hugh C. Lauer,et al. A recursive virtual machine architecture , 1973 .
[5] David A. Wagner,et al. A Secure Environment for Untrusted Helper Applications , 1996, USENIX Security Symposium.
[6] Michael B. Jones,et al. Modular real-time resource management in the Rialto operating system , 1995, Proceedings 5th Workshop on Hot Topics in Operating Systems (HotOS-V).
[7] B. Ford,et al. UUCS-96-005 Flexible Multi-Policy Scheduling based on CPU Inheritance , 1996 .
[8] James A. Gosling,et al. The java language environment: a white paper , 1995 .
[9] Douglas C. Schmidt,et al. Object-Oriented Components for High-speed Network Programming , 1995, COOTS.
[10] LepreauJay,et al. Microkernels meet recursive virtual machines , 1996 .
[11] Steven M. Bellovin,et al. Limitations of the Kerberos authentication system , 1990, CCRV.
[12] Peter B. Danzig,et al. A Hierarchical Internet Object Cache , 1996, USENIX ATC.
[13] Jeffrey C. Mogul,et al. Operating systems support for busy Internet servers , 1995, Proceedings 5th Workshop on Hot Topics in Operating Systems (HotOS-V).
[14] Maurice V. Wilkes,et al. The Cambridge CAP computer and its operating system (Operating and programming systems series) , 1979 .
[15] David R. Cheriton,et al. A caching model of operating system kernel functionality , 1994, OSDI '94.
[16] Jeffrey C. Mogul,et al. Hinted caching in the web , 1996, EW 7.
[17] Jochen Liedtke,et al. On micro-kernel construction , 1995, SOSP.
[18] Norman Hardy,et al. KeyKOS architecture , 1985, OPSR.
[19] Jeffrey C. Mogul,et al. The case for persistent-connection HTTP , 1995, SIGCOMM '95.
[20] Aniruddha S. Gokhale,et al. Measuring the Performance of Communication Middleware on High-Speed Networks , 1996, SIGCOMM.
[21] Mike Hibler,et al. Using annotated interface definitions to optimize RPC , 1995, SOSP.
[22] Dan S. Wallach,et al. Java security: from HotJava to Netscape and beyond , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[23] Frank Yellin,et al. Low Level Security in Java , 1995, WWW.
[24] Robert Wahbe,et al. Efficient and language-independent mobile programs , 1996, PLDI '96.
[25] Ian Goldberg,et al. A Secure Environment for Untrusted Helper Applications ( Confining the Wily Hacker ) , 1996 .