Skip to search formSkip to main contentSkip to account menu

Protected procedure

In computer science, the concept of protected procedure, first introduced as protected service routine in 1965, is necessary when two computations A… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2006
2006
Much of the research on scheduling schemes is prevented from being used in practice by the lack of implementations that provide… 
2003
2003
Fine-grained hardware protection, if it can be done without slowing down the processor, could deliver significant benefits to… 
2002
2002
Explains the option of individual voluntary arrangements (IVAs) when formal insolvency proceedings are taken against a UK… 
1999
1999
Traditional operating system rely on separate address-spaces for protection. The advent of 64-bit architectures has allowed the… 
1995
1995
Consider the dual pressures toward a more tightly integrated workstation window system: 1) the need to eeciently handle high… 
1990
1990
Two strategies, derived from J. P. Schaffer (1986), were compared as tests of significance for a complete set of planned… 
1984
1984
Highly Cited
1979
Highly Cited
1979
The need for hardware memory protection was first met when operating systems which permitted the running of users’ programs… 
1977
1977
The filing system for the CAP is based on the idea of preservation of capabilities: if a program has been able to obtain some… 
1976
1976
AbstractA case study in the design of an experimental operating system for the PDP-11/45 is presented. The objectives of the work…