![]() | ![]() |
1987 | ||
---|---|---|
6 | David F. Stevens: Who Goes There? A Dialogue of Questions and Answers About Benign Hacking. Int. CMG Conference 1987: 569-573 | |
1980 | ||
5 | David F. Stevens: Some Cautionary Aphorisms for User-Oriented Computer Management. IFIP Congress 1980: 791-796 | |
1978 | ||
4 | EE | David F. Stevens, Richard W. Watson, Paul Rotar, Arnold M. Peskin: New directions in computing at the National Laboratories. ACM Annual Conference (2) 1978: 656 |
1977 | ||
3 | David F. Stevens: Obfuscatory Measurement. Int. CMG Conference 1977: 33-42 | |
1968 | ||
2 | David F. Stevens: System evaluation on the Control Data 6600. IFIP Congress (1) 1968: 542-547 | |
1 | EE | David F. Stevens: Operating Systems: On overcoming high-priority paralysis in multiprogramming systems: a case history. Commun. ACM 11(8): 539-541 (1968) |
1 | Arnold M. Peskin | [4] |
2 | Paul Rotar | [4] |
3 | Richard W. Watson | [4] |