http://bwlampson.site/Publications.htm

The papers and other items are listed approximately in chronological order of publication. Each has an abstract. Nearly all are available on-line at least in Acrobat form. Many of them also appear as Web pages and as Microsoft Word documents. Some have Postscript files. When an item is about a system that I worked on, there is a cross-reference to a brief description of that system.

There are some items that are not regular publications but internal memos, interviews, etc. For the most part they have labels of the form 10a, 10b, etc.

  1. A user machine in a time-sharing system. Proc. IEEE 54, 12 (Dec. 1966), pp 1766-1774. Reprinted in Computer Structures, ed. Bell and Newell, McGraw-Hill, 1971, pp 291-300 (with M. Pirtle and W. Lichtenberger). Abstract, Postscript, Acrobat, Web page, Word. See SDS 940.

  2. A critique of ‘An exploratory investigation of programmer performance under on-line and off-line conditions’. IEEE Trans. Human Factors in Electronics HFE-8, 1 (Mar. 1967), pp 48-51. Abstract, Acrobat.

  3. An on-line editor. Comm. ACM 10, 12 (Dec. 1967), pp 793-799 (with P. Deutsch). Abstract, Acrobat, Acrobat as published, Web page, Word. See QED.

  4. A scheduling philosophy for multi-processing systems. Comm. ACM 11, 5 (May 1968), pp 347-359. Abstract, Acrobat, Acrobat, SOSP version, Acrobat, CACM version, Web page, Word. See Berkeley Computer Corporation.

  5. Dynamic protection structures. Proc. AFIPS Conf. 35 (1969), pp 27-38. Abstract, Acrobat. See Berkeley Computer Corporation.

6a. Some Remarks on a Large New Time-Sharing System. Internal memo, Berkeley Computer Corporation, September 1970. Abstract, Acrobat. See Berkeley Computer Corporation.

  1. On reliable and extendible operating systems. Proc. 2nd NATO Conf. on Techniques in Software Engineering, Rome, 1969. Reprinted in The Fourth Generation, Infotech State of the Art Report 1, 1971, pp 421-444. Abstract, Acrobat (InfoTech version), Word, Web page, Acrobat. See Cal TSS.

  2. Protection. Proc. 5th Princeton Conf. on Information Sciences and Systems, Princeton, 1971. Reprinted in ACM Operating Systems Rev. 8, 1 (Jan. 1974), pp 18-24. Abstract, Postscript, Acrobat, Web page, Word.

8a. Teaching of computer design to computer science undergraduates. In The Teaching of Computer Design, Proceedings of the joint IBM-University of Newcastle Seminar, September, 1971. Abstract, Acrobat.

  1. Protection and access control in operating systems. In Operating Systems, Infotech State of the Art Report 14, 1972, pp 309-326. Abstract, Acrobat.

  2. Remarks on the nature of programming. Guest editorial, Software-Practice and Experience 2, 3 (Jul. 1972), pp 195-196. Abstract, Postscript, Acrobat, Web page, Word.

10a. The control structure of an operating system. IBM Research Report RC3949, July 1972 (with J. Gray, B. Lindsay, and H. Sturgis). Abstract, Acrobat, Web Page, Word. See Cal TSS.

  1. Redundancy and robustness in memory protection. Invited paper, Proc. IFIP Cong., North-Holland, 1974, pp 128-132. Abstract, Acrobat.

  2. On the transfer of control between contexts. Lecture Notes in Computer Science 19, Springer, 1974, pp 181-203 (with J. Mitchell and E. Satterthwaite). Abstract, Acrobat. See Mesa, Mesa architecture.

  3. An open operating system for a single-user machine. Rev. Francaise d'Automatique, Informatique et Recherche Operationnelle 9, B-3 (Sept. 1975), pp 8-15. Substantially revised as [22]. See Alto OS.

15a. Alto User’s Handbook. Xerox Palo Alto Research Center, 1976. Abstract, Acrobat. See Alto, Bravo.