2009 | ||
---|---|---|
58 | Butler W. Lampson: Privacy and security - Usable security: how to get it. Commun. ACM 52(11): 25-27 (2009) | |
2008 | ||
57 | Butler W. Lampson: Lazy and speculative execution in computer systems. ICFP 2008: 1-2 | |
2006 | ||
56 | Butler W. Lampson: Lazy and Speculative Execution in Computer Systems. OPODIS 2006: 1-2 | |
55 | Butler W. Lampson: Gold and Fool's Gold: Successes, Failures, and Futures in Computer Systems Research. USENIX Annual Technical Conference, General Track 2006 | |
2004 | ||
54 | Butler W. Lampson: Computer Security in the Real World. IEEE Computer 37(6): 37-46 (2004) | |
2003 | ||
53 | Paul England, Butler W. Lampson, John Manferdelli, Marcus Peinado, Bryan Willman: A Trusted Open Platform. IEEE Computer 36(7): 55-62 (2003) | |
52 | Butler W. Lampson: Getting computers to understand. J. ACM 50(1): 70-72 (2003) | |
2001 | ||
51 | Butler W. Lampson: The ABCD's of Paxos. PODC 2001: 13 | |
2000 | ||
50 | Roberto De Prisco, Butler W. Lampson, Nancy A. Lynch: Revisiting the PAXOS algorithm. Theor. Comput. Sci. 243(1-2): 35-91 (2000) | |
1999 | ||
49 | Butler W. Lampson, Venkatachary Srinivasan, George Varghese: IP lookups using multiway and multicolumn search. IEEE/ACM Trans. Netw. 7(3): 324-334 (1999) | |
1998 | ||
48 | Butler W. Lampson, Kenneth A. Pier: A Processor for a High-Performance Personal Computer. 25 Years ISCA: Retrospectives and Reprints 1998: 180-194 | |
47 | Butler W. Lampson, Venkatachary Srinivasan, George Varghese: IP Lookups Using Multiway and Multicolumn Search. INFOCOM 1998: 1248-1256 | |
1997 | ||
46 | Roberto De Prisco, Butler W. Lampson, Nancy A. Lynch: Revisiting the Paxos Algorithm. WDAG 1997: 111-125 | |
1996 | ||
45 | Martín Abadi, Butler W. Lampson, Jean-Jacques Lévy: Analysis and Caching of Dependencies. ICFP 1996: 83-91 | |
44 | Butler W. Lampson: How to Build a Highly Available System Using Consensus. WDAG 1996: 1-17 | |
43 | David L. Tennenhouse, Butler W. Lampson, Sharon Eisner Gillett, Jennifer Steiner Klein: Virtual Infrastructure: Putting Information Infrastructure on the Technology Curve. Computer Networks and ISDN Systems 28(13): 1769-1790 (1996) | |
1994 | ||
42 | Butler W. Lampson: Interconnecting Computers: Architecture, Technology, and Economics. Programming Languages and System Architectures 1994: 1-20 | |
1993 | ||
41 | Butler W. Lampson, Nancy A. Lynch, Jørgen F. Søgaard-Andersen: Correctness of At-Most-Once Message Delivery Protocols. FORTE 1993: 385-400 | |
40 | Edward Wobber, Martín Abadi, Michael Burrows, Butler W. Lampson: Authentication in the Taos Operating System. SOSP 1993: 256-269 | |
39 | Butler W. Lampson, David B. Lomet: A New Presumed Commit Optimization for Two Phase Commit. VLDB 1993: 630-640 | |
38 | Martín Abadi, Michael Burrows, Butler W. Lampson, Gordon D. Plotkin: A Calculus for Access Control in Distributed Systems. ACM Trans. Program. Lang. Syst. 15(4): 706-734 (1993) | |
37 | Martín Abadi, Michael Burrows, C. Kaufman, Butler W. Lampson: Authentification and Delegation with Smart-Cards. Sci. Comput. Program. 21(2): 93-113 (1993) | |
1992 | ||
36 | Michael Burrows, Charles Jerian, Butler W. Lampson, Timothy Mann: On-Line Data Compression in a Log-Structured File System. ASPLOS 1992: 2-9 | |
35 | Butler W. Lampson, Nancy A. Lynch, Jørgen F. Søgaard-Andersen: At-Most-Once Message Delivery. A Case Study in Algorithm Verification. CONCUR 1992: 317-324 | |
34 | Butler W. Lampson, Martín Abadi, Michael Burrows, Edward Wobber: Authentication in Distributed Systems: Theory and Practice. ACM Trans. Comput. Syst. 10(4): 265-310 (1992) | |
1991 | ||
33 | Martín Abadi, Michael Burrows, Butler W. Lampson, Gordon D. Plotkin: A Calculus for Access Control in Distributed Systems. CRYPTO 1991: 1-23 | |
32 | Butler W. Lampson, Martín Abadi, Michael Burrows, Edward Wobber: Authentication in Distributed Systems: Theory and Practice. SOSP 1991: 165-182 | |
31 | Martín Abadi, Michael Burrows, C. Kaufman, Butler W. Lampson: Authentication and Delegation with Smart-cards. TACS 1991: 326-345 | |
1988 | ||
30 | Butler W. Lampson, Rod M. Burstall: Pebble, a Kernel Language for Modules and Abstract Data Types Inf. Comput. 76(2/3): 278-346 (1988) | |
1986 | ||
29 | Andrew Birrell, Butler W. Lampson, Roger M. Needham, Michael D. Schroeder: Current work on authentication. ACM SIGOPS European Workshop 1986 | |
28 | Andrew Birrell, Butler W. Lampson, Roger M. Needham, Michael D. Schroeder: A Global Authentication Service without Global Trust. IEEE Symposium on Security and Privacy 1986: 223-230 | |
27 | Butler W. Lampson: Designing a Global Name Service. PODC 1986: 1-10 | |
1984 | ||
26 | Rod M. Burstall, Butler W. Lampson: A Kernel Language for Abstract Data Types and Modules. Semantics of Data Types 1984: 1-50 | |
25 | Butler W. Lampson: Hints for Computer System Design. IEEE Software 1(1): 11-28 (1984) | |
24 | Butler W. Lampson: Gene McDaniel, Severo M. Ornstein: An Instruction Fetch Unit for a High-Performance Personal Conmputer. IEEE Trans. Computers 33(8): 712-730 (1984) | |
1983 | ||
23 | Butler W. Lampson, Eric E. Schmidt: Practical Use of a Polymorphic Applicative Language. POPL 1983: 237-255 | |
22 | Butler W. Lampson: Hints for Computer System Design. SOSP 1983: 33-48 | |
1982 | ||
21 | Butler W. Lampson: Fast Procedure Calls. ASPLOS 1982: 66-76 | |
1981 | ||
20 | Butler W. Lampson, M. Paul, Hans-Jürgen Siegert: Distributed Systems - Architecture and Implementation, An Advanced Course Springer 1981 | |
19 | Douglas W. Clark, Butler W. Lampson, Kenneth A. Pier: The Memory System of a High-Performance Personal Computer. IEEE Trans. Computers 30(10): 715-733 (1981) | |
1980 | ||
18 | Butler W. Lampson: Atomic Transactions. Advanced Course: Distributed Systems 1980: 246-265 | |
17 | Stephen R. Kimbleton, Pearl Y. Wang, Butler W. Lampson: Applications and Protocols. Advanced Course: Distributed Systems 1980: 308-370 | |
16 | Butler W. Lampson: Ethernet, Pup and Violet. Advanced Course: Distributed Systems 1980: 446-485 | |
15 | Butler W. Lampson, Kenneth A. Pier: A Processor for a High-Performance Personal Computer. ISCA 1980: 146-160 | |
14 | Butler W. Lampson, David D. Redell: Experience with Processes and Monitors in Mesa. Commun. ACM 23(2): 105-117 (1980) | |
1979 | ||
13 | Butler W. Lampson, David D. Redell: Experience with Processes and Monitors in Mesa (Summary). SOSP 1979: 43-44 | |
12 | Butler W. Lampson, Robert F. Sproull: An Open Operating System for a Single-User Machine. SOSP 1979: 98-105 | |
1978 | ||
11 | Ralph L. London, John V. Guttag, James J. Horning, Butler W. Lampson, James G. Mitchell, Gerald J. Popek: Proof Rules for the Programming Language Euclid. Program Construction 1978: 133-163 | |
10 | Ralph L. London, John V. Guttag, James J. Horning, Butler W. Lampson, James G. Mitchell, Gerald J. Popek: Proof Rules for the Programming Language Euclid. Acta Inf. 10: 1-26 (1978) | |
1977 | ||
9 | Gerald J. Popek, James J. Horning, Butler W. Lampson, James G. Mitchell, Ralph L. London: Notes on the Design of Euclid. Language Design for Reliable Software 1977: 11-18 | |
8 | Paul G. Heckel, Butler W. Lampson: A Terminal-Oriented Communication System. Commun. ACM 20(7): 486-494 (1977) | |
1976 | ||
7 | Butler W. Lampson, Howard E. Sturgis: Reflections on an Operating System Design. Commun. ACM 19(5): 251-265 (1976) | |
1974 | ||
6 | Butler W. Lampson: Redundancy and Robustness in Memory Protection. IFIP Congress 1974: 128-132 | |
5 | Butler W. Lampson: An open operating system for a single-user machine. Symposium on Operating Systems 1974: 208-217 | |
4 | Butler W. Lampson, James G. Mitchell, E. H. Satterthwhaite: On the transfer of control between contexts. Symposium on Programming 1974: 181-203 | |
1973 | ||
3 | Butler W. Lampson: A Note on the Confinement Problem. Commun. ACM 16(10): 613-615 (1973) | |
1968 | ||
2 | Butler W. Lampson: A scheduling philosophy for multiprocessing systems. Commun. ACM 11(5): 347-360 (1968) | |
1967 | ||
1 | L. Peter Deutsch, Butler W. Lampson: An online editor. Commun. ACM 10(12): 793-799 (1967) |