kw.\*:("ACCES RESSOURCE")
Results 1 to 7 of 7
Selection :
AN INTERFACE FOR INTERACTIVE USERS WITHIN A HETEROGENEOUS COMPUTER NETWORKBULL GM; HUCKLE BA.1979; EURO IFIP 79. EUROPEAN CONFERENCE ON APPLIED INFORMATION TECHNOLOGY/1979/LONDRES; NLD/USA/GBR; AMSTERDAM: NORTH-HOLLAND/NEW YORK: NORTH-HOLLAND/OXFORD: NORTH-HOLLAND; DA. 1979; PP. 405-409; BIBL. 9 REF.Conference Paper
ON THE ACCESS-CONTROL MECHANISM OF THE PROGRAM COMPONENT MANAGERSILBERSCHATZ A.1981; SOFTWARE-PRACT. EXPER.; GBR; DA. 1981; VOL. 11; NO 2; PP. 159-166; BIBL. 5 REF.Article
A MODEL FOR VERIFICATION OF DATA SECURITY IN OPERATING SYSTEMSPOPEK GJ; FARBER DA.1978; COMMUNIC. A.C.M.; USA; DA. 1978; VOL. 21; NO 9; PP. 737-749; BIBL. 32 REF.Article
ABSTRACT SPECIFICATION OF RESOURCE ACCESSING DISCIPLINES: ADEQUACY, STARVATION, PRIORITY AND INTERRUPTSLAUER PE; SHIELDS MW.1978; SIGPLAN NOT.; USA; DA. 1978; VOL. 13; NO 12; PP. 41-59; BIBL. 17 REF.Article
Distributed access management in multimedia IDCsBHATTI, Rafae; SHAFIQ, Basit; SHEHAB, Mohamed et al.Computer (Long Beach, CA). 2005, Vol 38, Num 9, pp 60-69, issn 0018-9162, 10 p.Article
Resource access control in systems of mobile agentsHENNESSY, Matthew; RIELY, James.Information and computation (Print). 2002, Vol 173, Num 1, pp 82-120, issn 0890-5401Article
A conditional abortable priority ceiling protocol for scheduling mixed real-time tasksLAM, K.-Y; NG, J. K.-Y.Journal of systems architecture. 2000, Vol 46, Num 7, pp 573-585, issn 1383-7621Article