Proceedings of the 1968 23rd ACM National Conference on - 1968
DOI: 10.1145/800186.810559
|View full text |Cite
|
Sign up to set email alerts
|

Design of a time-sharing system allowing interactive graphics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

1970
1970
1975
1975

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 5 publications
0
6
0
Order By: Relevance
“…A hardware protection scheme exists so that one segment of the map is reserved f o r the LM and protected from the user. As in some other systems [4,5], f i l e s are accessed by f i r s t binding f i l e pages into the virtual address space. This binding information is generated and maintained by the LFS in a table called the Coupling Table. The table is sectioned into two parts --the Local Monitor Coupling Table (LMCT) and the Task Coupling Table (TCT).…”
Section: Memory Hierarchy and Task Implementationmentioning
confidence: 99%
“…A hardware protection scheme exists so that one segment of the map is reserved f o r the LM and protected from the user. As in some other systems [4,5], f i l e s are accessed by f i r s t binding f i l e pages into the virtual address space. This binding information is generated and maintained by the LFS in a table called the Coupling Table. The table is sectioned into two parts --the Local Monitor Coupling Table (LMCT) and the Task Coupling Table (TCT).…”
Section: Memory Hierarchy and Task Implementationmentioning
confidence: 99%
“…Memory is seen as a single sequentially addressed space and, depending upon implementation specifics, one may either exchange named information within this space [20] or associate a name with the space itself [21]. A change in the use of named information, that is a file change, usually constitutes a resource shift or the crossing of a security boundary.…”
Section: Levels and Resourcementioning
confidence: 99%
“…The buffers by themselves are also common to the still lower teletype handling routines. A process at this level may be scheduled or it may be arrived at from a user process through a trap caused either by transferring control to a nonaccessible region in virtual space or by executing an illegal instruction [20]; or it may be initiated by a special hardware-implemented mode-shifting transfer [22]. Procedures typical of this level include many of the file handling functions.…”
Section: Levels and Resourcementioning
confidence: 99%
See 1 more Smart Citation
“…This project, known as ESOPE {Exploitation Simultan^e d'un Ordinateur et de ses Periph6rique.s), has been started at the Institut de Recherche d'Informatique et d'Automatique with a twofold purpose: (1) to provide interactive computer access to a community that is oriented toward scientific and software applications; and (2) to develop rational principles and to de.sign tools for resource-sharing systems.…”
Section: Introductionmentioning
confidence: 99%