Last update: Fri Mar 2 02:06:23 MST 2018
Top |
Symbols |
Numbers |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Dalpee:1993:BRV,
author = "Michael J. Dalpee and T. James Cannaliato",
title = "Beyond {RPC}: the {Virtual Network}",
journal = j-IEEE-PAR-DIST-TECH,
volume = "1",
number = "4",
pages = "41--57",
month = nov,
year = "1993",
CODEN = "IPDTEX",
DOI = "https://doi.org/10.1109/88.260292",
ISSN = "1063-6552 (print), 1558-1861 (electronic)",
ISSN-L = "1063-6552",
bibdate = "Fri Apr 11 07:24:28 MDT 1997",
bibsource = "Compendex database;
http://www.math.utah.edu/pub/tex/bib/ieeepardisttech.bib",
acknowledgement = ack-nhfb,
classification = "723; C6130S (Data security); C6150N (Distributed
systems)",
corpsource = "Adv. Comput. Enterprises Ltd., Highland, MD, USA",
journalabr = "IEEE Parallel Distrib Technol",
keywords = "communication; complexity; Computer networks; Computer
software; DCE RPC; distributed Ada compilation;
Distributed computer systems; distributed interprocess;
Distributed interprocess communication; distributed
programs; error handling; Intelligent software network;
intelligent software network; performance; remote
procedure calls; RPC; RPC virtual network; security;
security of data; system administration; tool; Virtual
Network; Virtual network",
treatment = "P Practical",
}
Related entries
- administration,
3(4)3,
4(3)60,
4(4)8
- Beyond,
2(2)37
- C6130S,
2(3)7,
4(2)9,
4(4)4
- C6150N,
1(2)62,
1(3)62,
1(3)71,
1(3)85,
2(1)26,
2(1)64,
2(2)30,
2(2)50,
2(2)57,
2(2)62,
2(3)27,
2(4)20,
2(4)32,
2(4)49,
2(4)61,
2(4)73,
3(1)25,
3(1)61,
3(1)75,
3(2)14,
3(2)22,
3(2)52,
3(4)12,
3(4)21,
3(4)44,
3(4)61,
4(1)25,
4(1)57,
4(2)15,
4(2)41,
4(2)89,
4(3)7,
4(3)15,
4(3)25,
4(3)45,
4(4)12
- call,
1(3)85,
2(2)62,
2(3)74,
2(4)5,
3(1)94,
3(2)84,
3(3)78,
3(4)100,
3(4)100,
4(1)101,
4(2)15,
4(2)94,
4(3)84,
4(4)65,
4(4)87
- communication,
1(2)3,
1(2)49,
1(2)62,
1(4)72,
2(1)26,
2(2)37,
2(2)57,
2(4)20,
2(4)32,
2(4)73,
3(1)4,
3(1)25,
3(1)61,
3(2)4,
3(2)14,
3(2)22,
3(2)29,
3(3)20,
3(4)21,
3(4)72,
4(1)9,
4(3)45,
4(4)8,
4(4)12,
4(4)65
- compilation,
2(1)64,
2(3)71,
2(3)73
- complexity,
1(2)21,
3(3)63,
3(4)14,
3(4)21,
3(4)34,
3(4)61
- error,
2(3)16,
2(3)48,
2(4)61,
4(2)26
- handling,
2(1)64,
3(4)21
- intelligent,
4(1)6
- procedure,
1(3)85,
3(1)12,
4(2)15,
4(4)65
- remote,
1(2)21,
1(3)71,
2(1)26,
3(2)29,
4(2)15,
4(4)23
- security,
2(3)7,
2(4)32,
4(2)9,
4(4)4
- tool,
1(2)33,
1(2)62,
2(1)40,
2(3)48,
2(3)71,
2(3)73,
2(4)9,
3(1)25,
3(1)37,
3(2)22,
3(4)3,
3(4)14,
3(4)21,
3(4)44,
3(4)72,
4(2)89,
4(3)12,
4(3)36
- virtual,
2(1)26,
2(2)8,
2(4)73,
3(1)4,
3(1)61,
3(2)4,
3(2)14,
3(3)20,
3(4)34,
4(1)6,
4(1)74,
4(1)84,
4(2)41,
4(2)49,
4(3)25,
4(4)12,
4(4)36,
4(4)50