The Inferno™ operating system

@article{Dorward1997TheIO,
  title={The Inferno™ operating system},
  author={Sean Dorward and Rob Pike and David L. Presotto and Dennis M. Ritchie and Howard Trickey and Philip Winterbottom},
  journal={Bell Labs Technical Journal},
  year={1997},
  volume={2},
  pages={5-18}
}
The Inferno™ operating system facilitates the creation and support of distributed services in the new and emerging world of network environments, such as those typified by CATV and direct satellite broadcasting systems, as well as the Internet. In addition, as the entertainment, telecommunications, and computing industries converge and interconnect, different types of data networks are arising, each one as potentially useful and profitable as the telephone network. However, unlike the telephone… CONTINUE READING
Highly Influential
This paper has highly influenced 12 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 68 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 48 extracted citations

UpperWare: Bringing resources back to the system

2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops) • 2010
View 5 Excerpts
Highly Influenced

Holistic aggregate resource environment

Operating Systems Review • 2008
View 4 Excerpts
Highly Influenced

69 Citations

051015'96'01'07'13'19
Citations per Year
Semantic Scholar estimates that this publication has 69 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-7 of 7 references

Cryptography in Software,” Proceedings of the UNIX Security Symposium IV, USENIX, Santa Clara, California, 1993, pp

J. B. Lacy, D. P. Mitchell, W. M. Schell, “CryptoLib
1-17. Further Reading – Inferno—A Complete Platform to Develop and Deploy Intelligent Devices in Any Networked Environment, Bell Labs Computing Sciences Research Center, Murray Hill, New Jersey, 1997. http://www.lucent.com/inferno • 1997

Programming in Limbo

Proceedings IEEE COMPCON 97. Digest of Papers • 1997

Applied Cryptography, Chapter 22

B. Schneier
1996

Cryptography - theory and practice

Discrete mathematics and its applications series • 1995

Similar Papers

Loading similar papers…