• Publications
  • Influence
A nation at risk: the imperative for educational reform
Because of the extraordinary clarity and importance of the Commission's Report, the editors of the Communica t ions decided to reprint the Report's main section in its entirety and present it to you here.
Certification of programs for secure information flow
This paper presents a mechanism for verifying the secure flow of information through a program that exploits the properties of a lattice structure among security classes and proves that a program cannot cause supposedly nonconfidential results to depend on confidential input data.
The working set model for program behavior
A new model, the “working set model,” is developed, defined to be the collection of its most recently used pages, which provides knowledge vital to the dynamic management of paged memories.
Operating Systems Theory
As one of the part of book categories, operating systems theory always becomes the most wanted book.
Hastily formed networks
  • P. Denning
  • Political Science, Computer Science
    Commun. ACM
  • 1 April 2006
The ability to form multi-organizational networks rapidly is crucial to humanitarian aid, disaster relief, and large urgent projects. Designing and implementing the network's conversation space is
Working Sets Past and Present
  • P. Denning
  • Computer Science
    IEEE Transactions on Software Engineering
  • 1980
This paper outlines the argument why it is unlikely that anyone will find a cheaper nonlookahead memory policy that delivers significantly better performance and suggests that a working set dispatcher should be considered.
Computing as a Discipline
The Operational Analysis of Queueing Network Models
This tutorial paper presents the basic results using the operational approach, a framework which allows the analyst to test whether each assumption is met in a given system, and methods for computing basic performance quantities.
Computing as a discipline
A summary is given of a report that had the following goals: to describe computer science in a way that emphasizes fundamental questions and significant accomplishments; to propose a teaching
Protection: principles and practice
The protection mechanisms of computer systems control the access to objects, especially information objects. The range of responsibilities of these mechanisms includes at one extreme completely