S
Sape J. Mullender
Researcher at Bell Labs
Publications - 138
Citations - 4037
Sape J. Mullender is an academic researcher from Bell Labs. The author has contributed to research in topics: Scheduling (computing) & File system. The author has an hindex of 30, co-authored 138 publications receiving 4009 citations. Previous affiliations of Sape J. Mullender include Cisco Systems, Inc. & Carl Zeiss AG.
Papers
More filters
Journal ArticleDOI
Amoeba: a distributed operating system for the 1990s
TL;DR: Amoeba as mentioned in this paper is a distributed operating system based on objects, which appears to users as a centralized system but has the speed, fault tolerance, security safeguards, and flexibility required for the 1990s.
Book
Experiences with the amoeba distributed operating system
Andrew S. Tanenbaum,Robbert van Renesse,Hans van Staveren,G.J. Sharp,Sape J. Mullender,Jack Jansen,Guido van Rossum +6 more
TL;DR: Amoeba as discussed by the authors is a distributed operating system that allows the user to connect multiple computers in a seamless way by providing the illusion of a single powerful timesharing system, when, in fact the system is implemented on a collection of machines, potentially distributed among several countries.
Journal ArticleDOI
Experiences with the Amoeba distributed operating system
TL;DR: The Amoeba project is a research effort aimed at understanding how to connect multiple computers in a seamless way and to build a distributed system that is transparent to the users, which is being used as a prototype and vehicle for further research.
Journal Article
MC-LMAC: A Multi-Channel MAC Protocol for Wireless Sensor Networks
TL;DR: MC-LMAC outperforms the contention-based multi-channel MMSN protocol, a cluster-based channel assignment method, and the single-channel CSMA in terms of data delivery ratio and throughput for high data rate, moderate-size networks of 100 nodes at different densities.
Proceedings Article
Using Sparse Capabilities in a Distributed Operating System
TL;DR: A distributed operating system that includes capabilities for naming and protecting objects is reported, and a variety of the issues involved is outlined, and four different ways of dealing with access rights are presented.