Safe Serialization Under Mutual Suspicion

From Erights

(Difference between revisions)
Jump to: navigation, search
(Safe Serialization Under Mutual Suspicion)
(Safe Serialization Under Mutual Suspicion)
Line 3: Line 3:
by Mark S. Miller
by Mark S. Miller
-
The chapters of this paper marked below with a "<tt>-></tt>" are submitted,<br /> together with a [http://www.erights.org/download/0-8-22/index.html working implementation], <br /> to Professor Scott Smith for credit as independent study.</center><center>(At the present time, the rest are not yet in a coherent state. Read farther at your own risk.)  
+
The chapters of this paper marked below with a "<tt>-></tt>" are submitted,<br /> together with a [http://www.erights.org/download/0-8-22/index.html working implementation], <br /> to Professor Scott Smith for credit as independent study.(At the present time, the rest are not yet in a coherent state. Read farther at your own risk.)  

Revision as of 22:06, 29 November 2006

Safe Serialization Under Mutual Suspicion

by Mark S. Miller

The chapters of this paper marked below with a "->" are submitted,
together with a working implementation,
to Professor Scott Smith for credit as independent study.(At the present time, the rest are not yet in a coherent state. Read farther at your own risk.)


Personal tools
more tools