ACM DL

Computer Systems (TOCS)

Menu

Search Issue
enter search term and/or author name

Archive


ACM Transactions on Computer Systems (TOCS), Volume 8 Issue 3, Aug. 1990

A formal protection model of security in centralized, parallel, and distributed systems
Glenn S. Benson, Ian F. Akyildiz, William F. Appelbe
Pages: 183-213
DOI: 10.1145/99926.99928
One way to show that a system is not secure is to demonstrate that a malicious or mistake-prone user or program can break security by causing the system to reach a nonsecure state. A fundamental aspect of a security model is a proof that...

Disk arm movement in anticipation of future requests
Richard P. King
Pages: 214-229
DOI: 10.1145/99926.99930
When a disk drive's access arm is idle, it may not be at the ideal location. In anticipation of future requests, movement to some other location may be advantageous. The effectiveness of anticipatory disk arm movement is explored. Various...

The effects of processor architecture on instruction memory traffic
Chad L. Mitchell, Michael J. Flynn
Pages: 230-250
DOI: 10.1145/99926.99933
The relative amount of instruction traffic for two architectures is about the same in the presence of a large cache as with no cache. Furthermore, the presence of an intermediate-sized cache probably substantially favors the denser architecture....