skip to main content
article
Free Access

A technique for passing reference parameters in an information-hiding architecture

Published:15 August 1979Publication History
First page image

References

  1. Dennis, J. B., and Van Horn, E. C. "Programming Semantics for Multiprogrammed Computations", Comm. ACM, 9, 3, March 1966, 143--155. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. England, D. M. "Architectural Features of System 250", Infotech State of the Art Report, No. 14, Operating Systems, 1972, 395--427.Google ScholarGoogle Scholar
  3. Fabry, R. S. "Capability-Based Addressing", Comm. ACM, 17, 7, July 1974, 403--412. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Keedy, J. L. "An Outline of the ICL2900 Series System Architecture", Australian Computer Journal, 9, 2, May 1977, 53--62.Google ScholarGoogle Scholar
  5. Keedy, J. L. "A Comparison of Two Process Structuring Models", MONADS Report No. 4, Dept of Computer Science, Monash University, 1979.Google ScholarGoogle Scholar
  6. Needham, R. M., and Walker, R. D. H. "The Cambridge CAP Computer and its Protection System", Proc. of the 6th ACM Symposium on Operating System Principles, Nov. 1977, 1--10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Parnas, D. L. "Information Distribution Aspects of Design Methodology", IFIP Congress 1971, Booklet TA-3, 26--30.Google ScholarGoogle Scholar
  8. Parnas, D. L. "A Technique for Software Module Specification with Examples", Comm. ACM, 15, 5, May 1972, 330--336. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Parnas, D. L. "On the Criteria to be Used in Decomposing Systems into Modules", Comm. ACM, 15, 12, Dec. 1972, 1053--1058. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Price, W. R. "Implications of a Virtual Memory Mechanism for Implementing Protection in a Family of Operating Systems", Ph.D. Thesis, Dept of Computer Science, Carnegie-Mellon University, 1973. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Schroeder, M. D. and Saltzer, J. H. "A Hardware Architecture for Implementing Protection Rings", Comm. ACM, 15, 3, March 1972, 157--170. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Shepherd, J. H. "Principal Design Features of the Multi-Computer (The Chicago Magic Number Computer)", Chicago University, Institute for Computer Research, Nov. 1968.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in

Full Access

  • Published in

    cover image ACM SIGARCH Computer Architecture News
    ACM SIGARCH Computer Architecture News  Volume 7, Issue 9
    August 1979
    14 pages
    ISSN:0163-5964
    DOI:10.1145/859500
    Issue’s Table of Contents

    Copyright © 1979 Author

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 15 August 1979

    Check for updates

    Qualifiers

    • article

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader