- Dennis, J. B., and Van Horn, E. C. "Programming Semantics for Multiprogrammed Computations", Comm. ACM, 9, 3, March 1966, 143--155. Google ScholarDigital Library
- England, D. M. "Architectural Features of System 250", Infotech State of the Art Report, No. 14, Operating Systems, 1972, 395--427.Google Scholar
- Fabry, R. S. "Capability-Based Addressing", Comm. ACM, 17, 7, July 1974, 403--412. Google ScholarDigital Library
- Keedy, J. L. "An Outline of the ICL2900 Series System Architecture", Australian Computer Journal, 9, 2, May 1977, 53--62.Google Scholar
- Keedy, J. L. "A Comparison of Two Process Structuring Models", MONADS Report No. 4, Dept of Computer Science, Monash University, 1979.Google Scholar
- Needham, R. M., and Walker, R. D. H. "The Cambridge CAP Computer and its Protection System", Proc. of the 6th ACM Symposium on Operating System Principles, Nov. 1977, 1--10. Google ScholarDigital Library
- Parnas, D. L. "Information Distribution Aspects of Design Methodology", IFIP Congress 1971, Booklet TA-3, 26--30.Google Scholar
- Parnas, D. L. "A Technique for Software Module Specification with Examples", Comm. ACM, 15, 5, May 1972, 330--336. Google ScholarDigital Library
- Parnas, D. L. "On the Criteria to be Used in Decomposing Systems into Modules", Comm. ACM, 15, 12, Dec. 1972, 1053--1058. Google ScholarDigital Library
- Price, W. R. "Implications of a Virtual Memory Mechanism for Implementing Protection in a Family of Operating Systems", Ph.D. Thesis, Dept of Computer Science, Carnegie-Mellon University, 1973. Google ScholarDigital Library
- Schroeder, M. D. and Saltzer, J. H. "A Hardware Architecture for Implementing Protection Rings", Comm. ACM, 15, 3, March 1972, 157--170. Google ScholarDigital Library
- Shepherd, J. H. "Principal Design Features of the Multi-Computer (The Chicago Magic Number Computer)", Chicago University, Institute for Computer Research, Nov. 1968.Google Scholar
Recommendations
An Information-Hiding Scheme Based on Quantization-Based Embedding Technique
Information hiding is a technique that embeds secret data in digital media for using in a variety of applications, including ownership protection, authentication, access control, annotation and so on. In this paper, we propose an information hiding ...
Histogram-based reversible data hiding technique using subsampling
MM&Sec '08: Proceedings of the 10th ACM workshop on Multimedia and securityReversible data hiding technique guarantees that the original cover image is completely recovered from the marked image after the hidden data are extracted. This technique can be applied in some applications such as medical imaging and law enforcement ...
A novel reversible data hiding scheme based on AMBTC compression technique
Data hiding encompasses a wide range of applications for embedding messages in content. However, hiding data inevitably destroys the host image, even though the distortion is imperceptible. To enhance the hiding capacity and maintain the quality of the ...
Comments