Number | Name | Date | Kind |
---|---|---|---|
5027269 | Grant et al. | Jun 1991 | |
5291585 | Sato et al. | Mar 1994 | |
5335320 | Iwata et al. | Aug 1994 | |
5345550 | Bloomfield | Sep 1994 | |
5347627 | Hoffmann et al. | Sep 1994 | |
5384911 | Bloomfield | Jan 1995 | |
5412772 | Monson | May 1995 | |
5414806 | Richards | May 1995 | |
5423034 | Cohen-Levy et al. | Jun 1995 | |
5430836 | Wolf et al. | Jul 1995 | |
5436637 | Gayraud et al. | Jul 1995 | |
5448695 | Douglas et al. | Sep 1995 | |
5461399 | Cragun | Oct 1995 | |
5461710 | Bloomfiled et al. | Oct 1995 | |
5473745 | Berry et al. | Dec 1995 | |
5491784 | Douglas et al. | Feb 1996 | |
5493638 | Hooper et al. | Feb 1996 | |
5509116 | Hiraga et al. | Apr 1996 | |
5526517 | Jones et al. | Jun 1996 | |
5544288 | Morgan et al. | Aug 1996 | |
5546519 | Berry | Aug 1996 | |
5548702 | Li et al. | Aug 1996 | |
5550968 | Miller et al. | Aug 1996 | |
5559942 | Gough et al. | Sep 1996 | |
5564003 | Bell et al. | Oct 1996 | |
5566330 | Sheffield | Oct 1996 | |
5570462 | McFarland | Oct 1996 | |
5572643 | Judson | Nov 1996 | |
5590199 | Krajewski, Jr. et al. | Dec 1996 | |
5694603 | Reiffin | Dec 1997 | |
5694604 | Reiffin | Dec 1997 | |
5754830 | Butts et al. | May 1998 | |
5832228 | Holden et al. | Nov 1998 | |
5935212 | Kalajan et al. | Aug 1999 | |
5940591 | Boyle et al. | Aug 1999 | |
5944794 | Okamoto et al. | Aug 1999 | |
5964836 | Rowe et al. | Oct 1999 |
Entry |
---|
Ronald L. Johnston, “The Dynamic Incremental Compiler of APL/3000” Proceedings of the API '79 Conference, published as APL Quote Quad, 9(4), p 82-87. |
Leo J. Guibas et al., “Compilation and Delayed Evaluation in APL,” Fifth Annual Synposium on Principles in Programming Languages, p. 1-8, 1978. |
Gleen Krasner “The Smalltalk-80 Virtual Machine” BYTE Publications Inc., Aug. 1991, pp. 300-320. |
Schneier, Bruce, “Why Cryptography is Harder Than It Looks,” Copyright 1996, Counterpane Systems. |
“(PAM) Pluggable Authentication Module,” Dated: Mar. 26, 1997. |
Miller, Steve, “Kerberos—Introduction to the Kerberos System,” Copyright 1985, 1986, Massachusetts Institute of Technology. |
Dasgupta, Sanjay et al., “A Movable User Interface Based on a Simple X-Window Like Protocol,” Proceedings of the International Conference on EC3—Energy, Computer, Communication and Control Systems, Aug. 28-30, 1991, pp. 199-203, vol. 3. |