HOME > Detail View

Detail View

Computer systems : theory, technology, and applications : a tribute to Roger Needham

Computer systems : theory, technology, and applications : a tribute to Roger Needham (Loan 1 times)

Material type
Personal Author
Herbert, A. J. (Andrew J.) , 1954- Sparck Jones, Karen , 1935-2007. Needham, R. M. (Roger Michael)
Title Statement
Computer systems : theory, technology, and applications : a tribute to Roger Needham / Andrew Herbert, Karen Sparck Jones, editors.
Publication, Distribution, etc
New York :   Springer ,   2004.  
Physical Medium
xvii, 338 p. : ill. ; 25 cm.
Series Statement
Monographs in computer science
038720170X (alk. paper) 9780387201702
Bibliography, Etc. Note
Includes bibliographical references.
Subject Added Entry-Topical Term
System design. Computer science.
000 01071camuu22003134a 4500
001 000045362756
005 20070620162656
008 031007s2004 nyua b 000 0 eng
010 ▼a 2003066215
020 ▼a 038720170X (alk. paper)
020 ▼a 9780387201702
035 ▼a (KERIS)REF000009773784
040 ▼a DLC ▼c DLC ▼d DLC ▼d 211009
042 ▼a pcc
050 0 0 ▼a QA76.9.S88 ▼b H45 2004
082 0 0 ▼a 005.1/2 ▼2 22
090 ▼a 005.12 ▼b C738
245 0 0 ▼a Computer systems : ▼b theory, technology, and applications : a tribute to Roger Needham / ▼c Andrew Herbert, Karen Sparck Jones, editors.
260 ▼a New York : ▼b Springer , ▼c 2004.
300 ▼a xvii, 338 p. : ▼b ill. ; ▼c 25 cm.
440 0 ▼a Monographs in computer science
504 ▼a Includes bibliographical references.
650 0 ▼a System design.
650 0 ▼a Computer science.
700 1 ▼a Herbert, A. J. ▼q (Andrew J.) , ▼d 1954-
700 1 ▼a Sparck Jones, Karen , ▼d 1935-2007.
700 1 ▼a Needham, R. M. ▼q (Roger Michael)
945 ▼a KINS

Holdings Information

No. Location Call Number Accession No. Availability Due Date Make a Reservation Service
No. 1 Location Science & Engineering Library/Sci-Info(Stacks2)/ Call Number 005.12 C738 Accession No. 121148038 Availability Available Due Date Make a Reservation Service B M

Contents information

Table of Contents

Contents Preface Roger Needham: 50 + 5 Meeting Programme Contributors Introduction: Roger Needham Rick Rashid 1 On Access Control, Data Integration, and Their Languages Martin Abadi 2 Protocol Analysis, Composability and Computation Ross Anderson, Michael Bond 3 Access Control in Distributed Systems Jean Bacon, Ken Moody 4 Implementing Condition Variables with Semaphores Andrew D. Birrell 5 Clumps, Clusters and Classification Christopher M. Bishop 6 How to Implement Unnecessary Mutexes Mike Burrows 7 Bioware Languages Luca Cardelli 8 The Economics of Open Systems David D. Clark 9 From Universe to Global Internet Jon Crowcroft 10 Needham-Schroeder Goes to Court Dorothy E. Denning 11 The Design of Reliable Operating Systems Peter Denning 12 An Historical Connection between Time-Sharing and Virtual Circuits Sandy Fraser 13 On Cross-Platform Security Li Gong 14 Distributed Computing Economics Jim Gray 15 The Titan Influence David Hartley 16 Middleware? Muddleware? Andrew Herbert 17 Grand Challenges for Computing Research Tony Hoare 18 Sentient Computing Andy Hopper 19 Cyber Security in Open Systems Anita Jones 20 Software Components: Only the Giants Survive Butler W. Lampson 21 Security Protocols: Who Knows What Exactly? Peter Landrock 22 Volume Rendering by Ray-Casting in Shear-Image Order Hugh C. Lauer, Yin Wu, Vishal Bhatia, Larry Seiler 23 A Conceptual Authorization Model for Web Services Paul J. Leach, Chris Kaler, Blair Dillaway, Praerit Garg, Brian LaMacchia, Butler Lampson, John Manferdelli, Rick Rashid, John Shewchuk, Dan Simon, Richard Ward 24 The Trouble with Standards E. Stewart Lee 25 Novelty in the Nemesis Operating System Ian Leslie 26 A Technology Transfer Retrospective Roy Levin 27 An Optical LAN Derek McAuley 28 What's in a Name? Robin Milner 29 The Cryptographic Role of the Cleaning Lady Bob Morris 30 Real Time in a Real Operating System Sape J. Mullender, Pierre G. Jansen 31 Zen and the Art of Research Management John Naughton, Robert W. Taylor 32 The Descent of BAN Lawrence C. Paulson 33 Brief Encounters Brian Randell 34 Retrieval System Models: What's New? Stephen Robertson, Karen Sparck Jones 35 Slammer: An Urgent Wake-Up Call Jerome H. Saltzer 36 Caching Trust Rather Than Content M. Satyanarayanan 37 Least Privilege and More Fred B. Schneider 38 Using Sharing to Simplify System Management Michael D. Schroeder 39 An RSA-Related Number-Theoretic Surprise Gustavus J. Simmons 40 Application-Private Networks Jonathan M. Smith 41 Using the CORAL System to Discover Attacks on Security Protocols Graham Steel, Alan Bundy, Ewen Denney 42 On the Role of Binding and Rate Adaptation in Packet Networks David Tennenhouse 43 Technologies for Portable Computing Chuck Thacker 44 Multiple Alternative Voting David Wheeler 45 The Semiotics of Umbrellas John Wilkes 46 Computers for Specialized Application Areas Maurice Wilkes 47 Computer Security? Roger Needham Roger Needham: Publications Karen Sparck Jones

Information Provided By: : Aladin

New Arrivals Books in Related Fields

Larson, Will (2022)
한국정보기술연구원 (2022)
한국정보기술연구원 (2021)
Lerner, Reuven (2021)
천인국 (2022)