Vermot-Gauchy, Program Checking Method, IBM Technical Disclosure Bullentin, vol. 14, No. 10, Mar. 1972, pp. 3187-3188. |
Crandall and Nelson, Dynamic Self-Checking for a Read-Only Storage, IBM Technical Disclosure Bulletin, vol. 19, No. 8, Jan. 1977, pp. 2868-2869. |
Greenberg, Control Word Error Correction, IBM Technical Disclosure Bulletin, vol. 13, No. 5, Oct. 1970, pp. 1357-1358. |
Glickstein, Weighted Checksum to Detect and Restore Altered Bits in Computer Memory, IBM Tech. Discl. Bulletin, vol. 13, No. 10, Mar. 1971, pp. 3146-3147. |
Boggs, Jr., Separate Store Protect and Fetch Protect, IBM Technical Disclosure Bulletin, vol. 19, No. 1, Jun. 1976, pp. 71. |
Zick, Two-Mode Storage Protection Mechanisms, IBM Technical Disclosure Bulletin, vol. 19, No. 2, Jul. 1976, pp. 425. |