Volume-8 Issue-6


Version
Download 32
Total Views 301
Stock
File Size 4.00 KB
File Type unknown
Create Date January 10, 2019
Last Updated May 8, 2019
Download

Download Souvenir

S. No

Volume-8 Issue-6, March 2019, ISSN: 2231-2307 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication

Page No.

1.

Authors:

Abid Ali, Zeeshan Akbar, Hassanullah

Paper Title:

Metamaterial Cloaking Designs with Calculation of Far-Field and Near-Field

Abstract: The cloaking theory is the mother of stealth technology. Now a day as per cloaking theory you can hide anything from the naked eye even satellites, Radars and cameras etc, are operational. The cloaking should guide electromagnetic waves around an object as if nothing were there, regardless of where the waves come from. The cloak could reduce the scattering of waves used for radio and aerospace technology. Mankind has a cloaking concept over several centuries. This paper comprises of different section. The section I is introduction of cloaking and metamaterial. In section II we describe brief history of cloaking. In section III types of cloaking with details. In section IV we describes applications and in V analyses of cloaking types with their beneficial and drawbacks. At the end we discussed conclusion.

Keywords: Communications, Metamaterial, Cloaking, Techniques, Invisibility, Naked eye. 

References:

  1. Romain Fleury and Andrea Alu` “Cloaking and Invisibility: A Review” Progress In Electromagnetics Research, Vol. 147, 171–202, 2014.
  2. Craster, R. V. and S. Guenneau, Acoustic Metamaterials: Negative Refraction, Imaging, Lensing and Cloaking, Springer, 2012.
  3. Veselago, V. G., “The electrodynamics of substances with simultaneously negative values of ε and μ,” Soviet Physics Uspekhi, Vol. 10, No. 4, 509–514, Apr. 1968.
  4. Smith, D. R., W. J. Padilla, D. C. Vier, S. C. Nemat-Nasser, and S. Schultz, “Composite medium with simultaneously negative permeability and permittivity,” Phys. Rev. Lett., Vol. 84, No. 18, 4184–4187, May 2000. 15.
  5. Pendry, J., “Optics: Positively negative,” Nature, Vol. 423, No. 6935, 22–23, May 2003. 16.
  6. Smith, D. R., J. B. Pendry, and M. C. K. Wiltshire, “Metamaterials and negative refractive index,” Science, Vol. 305, No. 5685, 788–792, Aug. 2004.
  7. Capolino, F., Applications of Metamaterials, CRC Press, 2009.
  8. Marqu´es, R., F. Mart´ın, and M. Sorolla, Metamaterials with Negative Parameters: Theory, Design and Microwave Applications, John Wiley & Sons, 2011.
  9. Jichun Li “A Literature Survey Of Mathematical Study Of Metamaterials” International Journal Of Numerical Analysis And Modeling, Institute for Scientific Computing and Information, Pages 230–243,Volume 13, 2 Number, 2016.
  10. G. Veselago, The electrodynamics of substances with simultaneously negative values of and µ, Soviet Phys. Uspekhi 10 (1968) 509–514.
  11. R. Smith, W.J. Padilla, D.C. Vier, S.C. Nemat-Nasser and S. Schultz, Composite medium with simultaneously negative permeability and permittivity, Phys. Rev. Lett. 84 (2000).
  12. A. Shelby, D.R. Smith and S. Schultz, Experimental verification of a negative index of refraction, Science 292 (2001) 489–491.
  13. Leonhardt, Optical conformal mapping, Science 312 (2006) 1777–1780.
  14. B. Pendry, D.Schurig and D.R. Smith, Controlling electromagnetic fields, Science 312(2006).
  15. Chen, C.T. Chan and P. Sheng, transformation optics and metamaterials, Nature Materials 9 (2010) 387–396.
  16. H. Werner and D.-H. Kwon (eds.), Transformation Electromagnetics and Metamaterials, Springer, 2014.
  17. Greenleaf, M. Lassas and G. Uhlmann, Anisotropic conductivities that cannot detected in EIT, Physiolog. Meas. (special issue on Impedance Tomography), 24 (2003) 413–420.
  18. Greenleaf, M. Lassas and G. Uhlmann, On nonuniqueness for Calder´ons inverse problem, Math. Res. Lett. 10 (2003) 685–693.
  19. Janos Perczel “Invisibility cloaking without superluminal propagation” University of St Andrews, 6 May 2011.
  20. F. Service and A. Cho, Science 330, 1622 (2010).
  21. Leonhardt and T. G. Philbin, Geometry and Light: The Science of Invisibility (Dover, Mineola 2010).
  22. K. Sarychev, V. M. Shalaev, Electrodynamics of Metamaterials (World Scientific, Singapore, (2007).
  23. Schurig, J. J. Mock, B. J. Justice, S. A. Cummer, J. B. Pendry, A. F. Starr and D. R. Smith, Science 314, 977 (2006).
  24. S. Li and J. B. Pendry, Phys. Rev. Lett. 101, 203901 (2008).
  25. Chen, Y. Luo, J. Zhang, K. Jiang, J.B. Pendry, and S. Zhang, Nature Commun. 2, 176 (2011).
  26. Chen and C. T. Chan, Appl. Phys. Lett. 91, 183518 (2007).
  27. Zhang, C. Xia, and N. Fang, Phys. Rev. Lett. 106, 024301 (2011).
  28. Pendry, J. B., D. Schurig, and D. R. Smith, “Controlling electromagnetic fields,” Science, Vol. 312, No. 5781, 1780–1782, Jun. 2006.
  29. Sheng, P., “Waves on the Horizon,” Science, Vol. 313, No. 5792, 1399–1400, Sep. 2006.
  30. Leonhardt, U. and T. Tyc, “Broadband invisibility by non-euclidean cloaking,” Science, Vol. 323, No. 5910, 110–112, Jan. 2009.
  31. Perczel, J., T. Tyc, and U. Leonhardt, “Invisibility cloaking without superluminal propagation,” New J. Phys., Vol. 13, No. 8, 083007, Aug. 2011.
  32. Hendi, A., J. Henn, and U. Leonhardt, “Ambiguities in the scattering tomography for central potentials,” Phys. Rev. Lett., Vol. 97, No. 7, 073902, Aug. 2006.
  33. Li, J. and J. B. Pendry, “Hiding under the carpet: A new strategy for cloaking,” Phys. Rev. Lett., Vol. 101, No. 20, 203901, Nov. 2008.
  34. Liu, R., C. Ji, J. J. Mock, J. Y. Chin, T. J. Cui, and D. R. Smith, “Broadband ground-plane cloak,” Science, Vol. 323, No. 5912, 366–369, Jan. 2009.
  35. Wood, B. and J. B. Pendry, “Metamaterials at zero frequency,” J. Phys.: Condens. Matter, Vol. 19, No. 7, 076208, Feb. 2007.
  36. Sanchez, A., C. Navau, J. Prat-Camps, and D.-X. Chen, “Antimagnets: Controlling magnetic fields with superconductor–metamaterial hybrids,” New J. Phys., Vol. 13, No. 9, Sep. 2011.
  37. Souc, J., M. Solovyov, F. Go¨m¨ory, J. Prat-Camps, C. Navau, and A. Sanchez, “A quasistatic magnetic cloak,” New J. Phys., Vol. 15, No. 5, 053019, May 2013.
  38. Yang, F., Z. L. Mei, T. Y. Jin, and T. J. Cui, “dc electric invisibility cloak,” Phys. Rev. Lett., Vol. 109, No. 5, 053902, Aug. 2012.
  39. Mei, Z. L., Y. S. Liu, F. Yang, and T. J. Cui, “A dc carpet cloak based on resistor networks,” Opt. Express, Vol. 20, No. 23, 25758–25765, Nov. 2012.
  40. Papas, C. H., Theory of Electromagnetic Wave Propagation, Courier Dover Publications, 2013.
  41. Jackson, J. D., Classical Electrodynamics, Wiley, 1998.
  42. Rainwater, D., A. Kerkhoff, K. Melin, J. C. Soric, G. Moreno, and A. Alu`, “Experimental verification of three-dimensional plasmonic cloaking in free-space,” New J. Phys., Vol. 14, No. 1, 013054, Jan. 2012.
  43. Alu`, A. and N. Engheta, “Achieving transparency with plasmonic and metamaterial coatings,” Phys. Rev. E, Vol. 72, No. 1, 016623, Jul. 2005.
  44. Munk, B. A., Frequency Selective Surfaces: Theory and Design, John Wiley & Sons, 2005.
  45. Tretyakov, S., Analytical Modeling in Applied Electromagnetics, Artech House, 2003.
  46. Alu`, A., “Mantle cloak: Invisibility induced by a surface,” Phys. Rev. B, Vol. 80, No. 24, 245115, Dec. 2009.
  47. Chen, P.-Y. and A. Alu`, “Mantle cloaking using thin patterned metasurfaces,” Phys. Rev. B, Vol. 84, No. 20, 205110, Nov. 2011.
  48. Padooru, Y. R., A. B. Yakovlev, P.-Y. Chen, and A. Alu`, “Line-source excitation of realistic conformal metasurface cloaks,” Journal of Applied Physics, Vol. 112, No. 10, Nov. 2012.
  49. Tretyakov, S., P. Alitalo, O. Luukkonen, and C. Simovski, “Broadband electromagnetic cloaking of long cylindrical objects,” Phys. Rev. Lett., Vol. 103, No. 10, 103905, Sep. 2009.
  50. Alitalo, P. and S. A. Tretyakov, “Electromagnetic cloaking of strongly scattering cylindrical objects by a volumetric structure composed of conical metal plates,” Phys. Rev. B, Vol. 82, No. 24, 245111, Dec. 2010.
  51. Alitalo, P., A. E. Culhaoglu, A. V. Osipov, S. Thurner, E. Kemptner, and S. A. Tretyakov, “Bistatic scattering characterization of a three-dimensional broadband cloaking structure,” Journal of Applied Physics, Vol. 111, No. 3, 034901–034901–5, 2012.
  52. Nicorovici, N. A., G. W. Milton, R. C. McPhedran, and L. C. Botten, “Quasistatic cloaking of two-dimensional polarizable discrete systems by anomalous resonance,” Opt. Express, Vol. 15, No. 10, 6314–6323, May 2007.
  53. Nicorovici, N.-A. P., R. C. McPhedran, S. Enoch, and G. Tayeb, “Finite wavelength cloaking by plasmonic resonance,” New J. Phys., Vol. 10, No. 11, 115020, Nov. 2008.
  54. Lai, Y., H. Chen, Z.-Q. Zhang, and C. T. Chan, “Complementary media invisibility cloak that cloaks objects at a distance outside the cloaking shell,” Phys. Rev. Lett., Vol. 102, Mar, 2009.
  55. Ma, H. F. and T. J. Cui, “Three-dimensional broadband ground-plane cloak made of metamaterials,” Nat. Commun., Vol. 1, 21, Jun. 2010.
  56. Cummer, S. A. and D. Schurig, “One path to acoustic cloaking,” New J. Phys., Vol. 9, No. 3, 45, Mar. 2007.
  57. Li, N., J. Ren, L. Wang, G. Zhang, P. Ha¨nggi, and B. Li, “Colloquium: Phononics: Manipulating heat flow with electronic analogs and beyond,” Rev. Mod. Phys., Vol. 84, No. 3, , Jul. 2012.
  58. Alu`, A., “Thermal cloaks get hot,” Physics, Vol. 7, No. 12 (3 pages), Feb. 3, 2014.
  59. Han, T., X. Bai, D. Gao, J. T. L. Thong, B. Li, and C.-W. Qiu, “Experimental demonstration of a bilayer thermal cloak,” Phys. Rev. Lett., Vol. 112, No. 5, 054302, Feb. 2014.
  60. Fleury, R. and A. Alu`, “Quantum cloaking based on scattering cancellation,” Phys. Rev. B, Vol. 87, No. 4, 045423, Jan. 2013.
  61. Liao, B., M. Zebarjadi, K. Esfarjani, and G. Chen, “Cloaking core-shell nanoparticles from conducting electrons in solids,” Phys. Rev. Lett., Vol. 109, No. 12, 126806, 2012.
  62. Fleury, R.andA. Alu`, “Furtive quantum sensingusingmatter-wave cloaks,” Phys. Rev. B,Vol. 87, No. 20, 201106, May 2013.
  63. Greenleaf, A., Y. Kurylev, M. Lassas, U. Leonhardt, and G. Uhlmann, “Cloaked electromagnetic, acoustic, and quantum amplifiers via transformation optics,” PNAS,Vol. 109, Jun. 2012.
  64. Chen, H., J. Yang, J. Zi, and C. T. Chan, “Transformation media for linear liquid surface waves,” EPL, Vol. 85, No. 2, 24004, Jan. 2009.
  65. Farhat, M., S. Enoch, S. Guenneau, and A. B. Movchan, “Broadband cylindrical acoustic cloak for linear surface waves in a fluid,” Phys. Rev. Lett., Vol. 101, No. 13, 134501, Sep. 2008.
  66. Brun, Guenneau, Movchan ‘Achieving control of in-plane elactic Waves”, 2009.
  67. A.Urzhumov and D.R.Smith, Fluid flow control with transformation media, Phys. Rev. Lett. 107, 074501, 2011.
  68. Gong and G. Wang, Superficial tumor hyperthermia with flat left-handed metamaterial lens, Progress In Electromagnetics Research 98 (2009) 389–405.
  69. Alu´ and N. Engheta, Dielectric sensing in -near-zero narrow waveguide channels, Phys. Rev. B 2008, 78, 045102:1045102:5.
  70. Shreiber, M. Gupta and R. Cravey, Comparative study of 1-D and 2-D metamaterial lens formicrowave nondestructive evaluation of dielectric materials, Sens. Actuat. A: Phys. 165 (2011).
  71. Labidi, J.B. Tahar and F. Choubani, Meta-materials applications in thin-film sensing and sensing liquids properties, Opt. Express 19 (2011) 733–739.
  72. L. Xu, B. Peng, D.H. Li, J. Zhang, M.L. Wong, Q. Zhang, S.J. Wang and Q.H. Xiong, Flexible visible infrared metamaterials and their applications in highly sensitive chemical and biological sensing, Nano Lett. 11 (2011) 3232–3238.

1-8

http://blueeyesintelligence.org/2checkout_download.html

2.

Authors:

Byeong Kil Lee

Paper Title:

Workload Pruning for Effective Architecture Exploration

Abstract: Design exploration requires the detailed simulation which is running multiple applications on a cycle-level microprocessor simulator. Main objectives of simulation-level design exploration include understanding the architectural behaviors of target applications and finding optimal configurations to cover wide range of applications in terms of performance and power. However, full simulation of an industry standard benchmark suite takes several weeks to months to complete. This problem has motivated several research groups to come up with methodologies to reduce simulation time while maintaining a certain level of accuracy. Among many techniques for reducing simulation time, a tool called SimPoint is popularly used. However, simulation load even with the reduced workloads is still heavy, considering design complexity of modern microprocessors. Motivation of this research is started from how design exploration is actually performed. Designers will observe the performance impact from resource variations or configuration changes. If a simulation point shows low sensitivity to resource variations, designers would skip those simulations. In this paper, we focus on identifying those simulation points which do not give big impact to representative behaviors, by which overall simulation time can be effectively reduced. We also performed the performance-sensitivity-based similarity analysis (K-mean clustering) among simulation points on specific performance metric which can lead to effective workload pruning.

Keywords: workload characterization; performance evaluation; workload reduction; early-stage design exploration; performance evaluation. 

References:

  1. Joshua J. Yi, David J. Lilja, Douglas M. Hawkins, A statistically rigorous approach for improving simulation methodology, International Symposium on High-Performance Computer Architecture (HPCA), February, 2003
  2. Plackett and J. Burman, “The Design of Optimum Multifactorial Experiments", Biometrika, Vol. 33, Issue 4, June 1956, Pages 305-325
  3. Lilja, “Measuring Computer Performance”, Cambridge University Press, 2000
  4. Yi and D. Lilja, "Effects of Processor Parameter Selection on Simulation Results", MSI Report 2002/146, 2002
  5. C. Montgomery, “Design and Analysis of Experiments”, Third Edition, Wiley 1991
  6. Standard Performance Evaluation Corporation (SPEC) website, http://www.spec.org/
  7. Nair and L. John, “Simulation Points for SPEC 2006,” International Conference on Computer Design (ICCD'08). October 2008
  8. Phansalkar, A. Joshi and L. K. John, “Analysis of Redundency and Application Balance in the SPEC CPU2006 Benchmark Suite,” The 34th International Symposium on Computer Architecture (ISCA). June 2007
  9. PIN home page: http://rogue.colorado.edu/Pin/
  10. Hamerly, E. Perelman, J. Lau, and B. Calder, “SimPoint 3.0: Faster and More Flexible Program Analysis ,” Workshop on Modeling, Benchmarking and Simulation, June 2005
  11. Sherwood, E. Perelman, G. Hamerly, and B. Calder. “Automatically Characterizing Large Scale Program Behavior,” Proc. International Conf. Architectural Support for Programming Languages and Operating Systems (ASPLOS), pp. 45–57, Oct. 2002 http://cseweb.ucsd.edu/~calder/simpoint/single-sim-pionts.htm
  12. Eeckhout, R. H. Bell, B. Stougie, K. Bosschere and L. K. John, “Control Flow Modeling in Statistical Simulation for Accurate and Efficient Processor Design Studies,” ISCA. pp. 350-361 2004
  13. J. KleinOsowski and D. J. Lilja, “MinneSPEC: A New SPEC Benchmark Workload for Simulation-Based Computer Architecture Research,” Computer Architecture Letters, vol.1, May, 2002
  14. Lee, S. Evans, and S. Cho "Accurately Approximating Superscalar Processor Performance from Traces,” Proceedings of the ISPASS, pp. 238~248, Boston, Massachusetts, April, 2009
  15. Ganesan, J. Jo, and L. K. John, “Synthesizing Memory-Level Parallelism Aware Miniature Clones for SPEC CPU2006 and ImplantBench Workloads,” ISPASS, March, 2010
  16. E. Wunderlich, T. F. Wenisch, B. Falsafi, J. C. Hoe, “SMARTS: accelerating microarchitecture simulation via rigorous statistical sampling,” Proceedings. 30th Annual International Symposium on Computer Architecture, pp. 84-95 ,June, 2003
  17. Patil, R. Cohn, M. Charney, R. Kapoor, A. Sun and A. Karunanidhi, “Pinpointing Representative Portions of Large Intel Itanium Programs with Dynamic Instrumentation,” In Proceedings of the 37th Annual IEEE/ACM international Symposium on Microarchitecture, 2004
  18. Eeckhout, H. Vandierendonck and K. Bosschere, “Quantifying the Impact of Input Data Sets on Program Behavior and its Applications,” Journal of Instruction-Level Parallelism, vol. 5, pp. 1-33, 2003
  19. C. Burger and Todd M. Austin, “The Simplescalar Tool Set, Version 2.0,” UW Madison Computer Sciences Technical Report #1342, 1997
  20. B. Noonburg and J. P. Shen. “A Framework for Statistical Modeling of Superscalar Processor Performance,” Proc. Int’l Symp. High-Performance Computer Architecture (HPCA), pp. 298–309, Feb.1997
  21. Luk, R. zohn, R. Muth, H. Patil, A. Klauser, G. Lowney, S. Wallace, V. Reddi, and K. Hazelwood, “Pin: building customized program analysis tools with dynamic instrumentation,” In Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI ’05. ACM, pp. 190-200, 2005
  22. H. Bell and L. K. John, “Improved Automatic Testcase Synthesis for Performance Model Validation,“ 19th ACM International Conference on Supercomputing, June 2005
  23. Raghunath and B. Lee, “Selection of Representative Simulation Point using Performance Metric based Similarity,” Sixth workshop on Unique Chips and System (UCAS-6), December 2010
  24. Eeckhout, H. Vandierendonck,and K. De Bosschere, “Workload Design: Selecting Representative Program-Input Pairs,”International Conference on Parallel Architectures and Compilations Techniques, 2002
  25. Tan, M. Steinbach, and V. Kumar, “Intruction to Dada Mining”, pp.496-513, 2006
  26. R language and enviroment website, http://www.r-project.org/

9-16

http://blueeyesintelligence.org/2checkout_download.html

3.

Authors:

Youssef Bassil

Paper Title:

4-Tier Service-Oriented Architecture for Building Smart Cities

Abstract: Currently, the world is increasingly focusing on transforming its traditional way of living into a digital, intelligent, mobile, and futuristic new urban environment called Smart City. This new paradigm shift heavily relies on information and communication technologies and has led to the rise of web services, service-oriented architectures, digital ecosystems, intelligent transport systems, e-services, and online social collaboration. This paper proposes a 4-Tier, Distributed, Open, and Service-Oriented Architecture for building Smart Cities. It is a 4-Tier architecture comprising Presentation, Middleware, Service, and Data tiers. It exploits Distributed computing as it is made up of small computational units operating over distant machines. It is open due to its scalable and extendable architecture, and it is Service-based as it is composed of granular interoperable and heterogeneous micro services. At the core of the proposed architecture is the middleware which provides Standardization and Communication Language, Application Programming Interface, Service Registry, and Security Services. All in all, the proposed architecture could prove to be a role model for building sustainable, interoperable, scalable, agile, open, and collaborative Smart Cities for 21st century. Future research can improve upon the proposed architecture so much so that data intelligence can be integrated into the middleware allowing the system to infer, reason, and help in decision making and problem solving.

Keywords: Distributed Computing, Service-Oriented Architecture, Services, Smart City

References:

  1. Mark Deakin, Husam Al Waer, "From Intelligent to Smart Cities", Journal of Intelligent Buildings International: From Intelligent Cities to Smart Cities, vol. 3 no. 3, pp. 140–152, 2011
  2. Paskaleva, K, "Enabling the smart city: The progress of e-city governance in Europe", International Journal of Innovation and Regional Development, vol. 1 no. 4, pp.405–422, 2009.
  3. Peris-Ortiz, Marta; Bennett, Dag R.; Yabar, Diana Pérez-Bustamante, "Sustainable Smart Cities: Creating Spaces for Technological, Social and Business Development", Springer, ISBN 9783319408958, 2016
  4. Komninos Nicos, "Intelligent cities: towards interactive and global innovation environments", International Journal of Innovation and Regional Development vol. 1 no. 4, pp. 337–355, 2009
  5. Komninos Nicos, "Intelligent cities: innovation, knowledge systems and digital spaces", London: Spon Press, 2002.
  6. Odendal Nancy, "Information and communication technology and local governance: understanding the difference between cities in developed and emerging economies", Computers, Environment and Urban Systems, vol. 27, no. 6, pp.585–607, 2003
  7. McLaren, Duncan; Agyeman, Julian, "Sharing Cities: A Case for Truly Smart and Sustainable Cities", MIT Press. ISBN 9780262029728, 2015
  8. Nicolai M. Josuttis, "SOA in Practice", O’Reilly, ISBN-10: 0596529554, 2007
  9. Ian Sommerville, "Software Engineering", 7th Edition, Addison Wesley, ISBN-10: 0121313156, 2002
  10. Thomas Erl, "Service-Oriented Architecture: Concepts, Technology, and Design", Prentice Hall, ISBN-13: 0131858580, 2005
  11. Olaf Zimmermann, Cesare Pautasso, Gregor Hohpe, Bobby Woolf, "A Decade of Enterprise Integration Patterns", IEEE Software, vol. 33 no. 1, pp.13–19, 2016
  12. Benslimane, D.; Dustdar, S.; Sheth, A., "Services Mashups: The New Generation of Web Applications", IEEE Internet Computing, vol. 10 no. 5, pp. 13–15, 2008
  13. Pautasso, Cesare, "Microservices in Practice, Part 1: Reality Check and Service Design", IEEE Software, vol. 34 no. 1, pp. 91–98, 2017
  14. Christoph Schroth & Till Janner, "Web 2.0 and SOA: Converging Concepts Enabling the Internet of Services", IT Professional, Nr. 3, pp. 36–41, IEEE Computer Society, 2007
  15. Negash, S, "Business Intelligence", Communications of the Association of Information Systems, vol. 13, pp. 177–195, 2004
  16. Mark Rhodes-Ousley, Roberta Bragg, and Keith Strassberg, "Network Security: The Complete Reference", McGraw-Hill, ISBN: 0072226978, 2003.
  17. William Stallings and Lawrie Brown, "Computer Security: Principles and Practice", Prentice Hall, ISBN: 0136004245, 2007.
  18. Matt Bishop, "Computer Security: Art and Science", Addison-Wesley, ISBN-10: 0201440997, 2002
  19. Anderson, R., Bond, M., Clulow, J., Skorobatov, S., Cryptographic processors a survey, Proceedings of the IEEE, vol. 94 no. 2, pp. 357-369, 2006.
  20. Lampson, Butler W, "Protection", Proceedings of the 5th Princeton Conference on Information Sciences and Systems, pp. 437, 1971.

17-20

http://blueeyesintelligence.org/2checkout_download.html