AAAAAA

   
Results: 1-4 |
Results: 4

Authors: ABADI M LAMPSON B LEVY JJ
Citation: M. Abadi et al., ANALYSIS AND CACHING OF DEPENDENCIES, ACM SIGPLAN NOTICES, 31(6), 1996, pp. 83-91

Authors: TENNENHOUSE D LAMPSON B GILLETT SE KLEIN JS
Citation: D. Tennenhouse et al., VIRTUAL INFRASTRUCTURE - PUTTING INFORMATION INFRASTRUCTURE ON THE TECHNOLOGY CURVE, Computer networks and ISDN systems, 28(13), 1996, pp. 1769-1790

Authors: WOBBER E ABADI M BURROWS M LAMPSON B
Citation: E. Wobber et al., AUTHENTICATION IN THE TAOS OPERATING SYSTEM, ACM transactions on computer systems, 12(1), 1994, pp. 3-32

Authors: ABADI M BURROWS M LAMPSON B PLOTKIN G
Citation: M. Abadi et al., A CALCULUS FOR ACCESS-CONTROL IN DISTRIBUTED SYSTEMS, ACM transactions on programming languages and systems, 15(4), 1993, pp. 706-734
Risultati: 1-4 |