Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Active Networking and End-To-End Arguments, , and . (1998)The Protection of Information in Computer Systems, and . Proceedings of the IEEE 63-9, (1975)A Hardware Architecture for Implementing Protection Rings (Abstract)., and . SOSP, page 42-54. ACM, (1971)Operating System Review 6(1-2).Needed: a systematic structuring paradigm for distributed data.. ACM SIGOPS European Workshop, ACM, (1992)Why a Ring?, , and . Comput. Networks, (1983)Some considerations of supervisor program design for multiplexed computer systems., and . IFIP Congress (1), page 315-321. (1968)Research Problems of Decentralized Systems with Largely Autonomous Nodes.. Advanced Course: Operating Systems, volume 60 of Lecture Notes in Computer Science, page 583-593. Springer, (1978)Naming and Binding of Objects.. Advanced Course: Operating Systems, volume 60 of Lecture Notes in Computer Science, page 99-208. Springer, (1978)R68-41 Development of Executive Routines, Both Hardware and Software.. IEEE Trans. Computers, 17 (9): 923-924 (1968)Project ATHENA as a Next Generation Educational Computing System., , and . GI Jahrestagung (1), volume 222 of Informatik-Fachberichte, page 21-29. Springer, (1989)