default search action
Maurice V. Wilkes
Person information
- award (1967): Turing Award
- award (1997): IEEE John von Neumann Medal
- award (1981): W. Wallace McDowell Award
- award (1980): Eckert-Mauchly Award
- award (1968): Harry H. Goode Memorial Award
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2000 – 2009
- 2007
- [j60]Maurice V. Wilkes:
High Performance Processor Chips. Trans. High Perform. Embed. Archit. Compil. 1: 1-4 (2007) - 2006
- [j59]Maurice V. Wilkes:
What I Remember of the ENIAC. IEEE Ann. Hist. Comput. 28(2): 30-31 (2006) - 2003
- [j58]Thomas Haigh, Maurice V. Wilkes:
Biographies. IEEE Ann. Hist. Comput. 25(4): 89-92 (2003) - 2001
- [j57]Maurice V. Wilkes:
The memory gap and the future of high performance memories. SIGARCH Comput. Archit. News 29(1): 2-7 (2001) - [j56]Maurice V. Wilkes:
High Performance Memory Systems. IEEE Trans. Computers 50(11): 1105 (2001) - 2000
- [j55]Maurice V. Wilkes:
Introduction to "Babbage's Analytical Engine Plans 28 and 28a-The Programmer's Interface". IEEE Ann. Hist. Comput. 22(4): 4-5 (2000)
1990 – 1999
- 1998
- [j54]Maurice V. Wilkes:
A Revisionist Account of Early Language Development. Computer 31(4): 22-25 (1998) - 1997
- [j53]Maurice V. Wilkes:
Arithmetic on the EDSAC MAURICE V. IEEE Ann. Hist. Comput. 19(1): 13-15 (1997) - [j52]Maurice V. Wilkes, Andrew Hopper:
The collapsed LAN: a solution to a bandwidth problem? SIGARCH Comput. Archit. News 25(3): 1-5 (1997) - [c22]Maurice V. Wilkes:
The impediments to technological advancement imposed by the laws of physics. ACM Annual Conference 1997: 12 - 1996
- [c21]Maurice V. Wilkes:
Computers Then and Now - Part 2. ACM Conference on Computer Science 1996: 115-119 - [c20]Maurice V. Wilkes:
Arithmetic on the EDSAC. ACM Conference on Computer Science 1996: 120-122 - 1995
- [b1]Maurice V. Wilkes:
Computing perspectives. Morgan Kaufmann 1995, ISBN 978-1-55860-317-2, pp. I-X, 1-207 - [j51]Maurice V. Wilkes:
A Tribute to Presper Eckert. Commun. ACM 38(9): 20-22 (1995) - [j50]Maurice V. Wilkes:
The memory wall and the CMOS end-point. SIGARCH Comput. Archit. News 23(4): 4-6 (1995) - 1994
- [j49]Maurice V. Wilkes:
Operating Systems in a Changing World. ACM SIGOPS Oper. Syst. Rev. 28(2): 9-21 (1994) - [c19]Maurice V. Wilkes:
The EDSAC: Origins and Design Decisions. IFIP Congress (2) 1994: 301-306 - 1993
- [j48]Maurice V. Wilkes:
Light Amplifiers and Solitons. Commun. ACM 36(2): 21-23 (1993) - [j47]Maurice V. Wilkes:
From Fortran and Algol to Object-Oriented Languages. Commun. ACM 36(7): 21-23 (1993) - 1992
- [j46]Maurice V. Wilkes:
EDSAC 2. IEEE Ann. Hist. Comput. 14(4): 49-56 (1992) - [j45]Maurice V. Wilkes:
Charles Babbage - The Great Uncle of Computing? Commun. ACM 35(3): 15-21 (1992) - [j44]Maurice V. Wilkes:
The Long-Term Future of Operating Systems. Commun. ACM 35(11): 23-24 (1992) - 1991
- [j43]Maurice V. Wilkes:
Babbage's Expectations for his Engines. IEEE Ann. Hist. Comput. 13(2): 141-145 (1991) - [j42]Maurice V. Wilkes:
Pray Mr. Babbage-A character study in dramatic form. IEEE Ann. Hist. Comput. 13(2): 147-154 (1991) - [j41]Maurice V. Wilkes:
Software and the Programmer. Commun. ACM 34(5): 23-24 (1991) - [j40]Maurice V. Wilkes:
Revisiting Computer Security in the Business World. Commun. ACM 34(8): 19-21 (1991) - [j39]Maurice V. Wilkes:
Could It Have Been Predicted? Commun. ACM 34(10): 19-21 (1991) - 1990
- [j38]Maurice V. Wilkes:
Computer Security in the Business World. Commun. ACM 33(4): 399-401 (1990) - [j37]Maurice V. Wilkes:
Networks, Email, and FAX. Commun. ACM 33(6): 631-633 (1990) - [j36]Maurice V. Wilkes:
The Bandwidth Famine. Commun. ACM 33(8): 19-21 (1990) - [j35]Maurice V. Wilkes:
It's All Software Now. Commun. ACM 33(10): 19-21 (1990) - [j34]Maurice V. Wilkes:
The Rise of the VLSI Processor. Commun. ACM 33(12): 16-17 (1990)
1980 – 1989
- 1988
- [c18]Maurice V. Wilkes:
ACM SIGOPS European workshop 1988: position paper. ACM SIGOPS European Workshop 1988 - 1986
- [j33]Maurice V. Wilkes:
Empiric: a sketch of a programming language designed to facilitate a fine grain of protection. ACM SIGPLAN Notices 21(8): 16-27 (1986) - 1984
- [j32]Maurice V. Wilkes:
Security Management and Protection - A Personal Approach. Comput. J. 27(1): 3-7 (1984) - 1983
- [j31]Maurice V. Wilkes:
Keeping jump instructions out of the pipeline of a RISC-like computer. SIGARCH Comput. Archit. News 11(5): 5-7 (1983) - [c17]Maurice V. Wilkes:
Size, Power, and Speed. ISCA 1983: 2-4 - 1982
- [c16]Maurice V. Wilkes:
Hardware Support for Memory Protection: Capability Implementations. ASPLOS 1982: 107-116 - [c15]Maurice V. Wilkes:
Keynote address - the processor instruction set. MICRO 1982: 3-5 - 1981
- [j30]Maurice V. Wilkes:
The Design of a Control Unit-Reflections on Reading Babbage's Notebooks. IEEE Ann. Hist. Comput. 3(2): 116-120 (1981) - 1980
- [j29]Maurice V. Wilkes:
The Impact of Wide-Band Local Area Communication Systems on Distributed Computing. Computer 13(9): 22-25 (1980) - [j28]Maurice V. Wilkes, Roger M. Needham:
The Cambridge Model Distributed System. ACM SIGOPS Oper. Syst. Rev. 14(1): 21-29 (1980) - [j27]Maurice V. Wilkes:
A New Hardware Capability Architecture. ACM SIGOPS Oper. Syst. Rev. 14(2): 17-20 (1980)
1970 – 1979
- 1978
- [c14]Maurice V. Wilkes:
Minicomputers, main frames, and distributed systems (Keynote Address). SIGMINI 1978: 1-6 - [c13]S. Ron Oliver, Grace M. Hopper, Randall Rustin, Maurice V. Wilkes, Herbert R. J. Grosch, Michael P. Deisenroth:
The future of small systems (Distinguished Panel). SIGMINI 1978: 7-8 - [e1]Maurice V. Wilkes, Laszlo A. Belady, Y. H. Su, Harry Hayman, Philip H. Enslow Jr.:
Proceedings of the 3rd International Conference on Software Engineering, Atlanta, Georgia, USA, May 10-12, 1978. IEEE Computer Society 1978 [contents] - 1977
- [c12]Maurice V. Wilkes:
Beyond Today's Computers. IFIP Congress 1977: 1-5 - 1976
- [j26]Maurice V. Wilkes:
Software Engineering and Structured Programming. IEEE Trans. Software Eng. 2(4): 274-276 (1976) - [c11]Maurice V. Wilkes:
Software Engineering and Structured Programming (Abstract). ICSE 1976: 387 - 1974
- [j25]Roger M. Needham, Maurice V. Wilkes:
Domains of Protection and the Management of Processes. Comput. J. 17(2): 117-120 (1974) - 1973
- [j24]Maurice V. Wilkes:
The Dynamics of Paging. Comput. J. 16(1): 4-9 (1973) - [j23]Maurice V. Wilkes:
The Cambridge Multiple-Access System in Retrospect. Softw. Pract. Exp. 3(4): 323-332 (1973) - 1972
- [j22]Maurice V. Wilkes:
On preserving the integrity of data bases. Comput. J. 15(3): 191-194 (1972) - [j21]Maurice V. Wilkes:
Associative tabular data structures. Int. J. Parallel Program. 1(3): 225-233 (1972) - [j20]Maurice V. Wilkes, W. D. Manville:
The associative languageal -1. Int. J. Parallel Program. 1(4): 315-327 (1972) - [c10]Maurice V. Wilkes:
Historical perspectives: computer architecture. AFIPS Fall Joint Computing Conference (2) 1972: 971-976 - [c9]Maurice V. Wilkes:
The use of a writable control memory in a multiprogramming environment. MICRO 1972: 62-65 - 1971
- [j19]Maurice V. Wilkes:
Associative tabular data structures. ACM SIGPLAN Notices 6(2): 337-345 (1971) - [j18]Maurice V. Wilkes:
Slave Memories and Segmentation. IEEE Trans. Computers 20(6): 674-675 (1971) - [c8]Maurice V. Wilkes:
Automatic load adjustment in time-sharing systems. SIGOPS Workshop on System Performance Evaluation 1971: 308-320
1960 – 1969
- 1969
- [j17]Maurice V. Wilkes:
Review: Book Review. Comput. J. 12(4): 316 (1969) - [j16]Maurice V. Wilkes:
The Growth of Interest in Microprogramming: A Literature Survey. ACM Comput. Surv. 1(3): 139-145 (1969) - [c7]Maurice V. Wilkes:
A model for core space allocation in a time-sharing system. AFIPS Spring Joint Computing Conference 1969: 265-271 - 1968
- [j15]Maurice V. Wilkes, Roger M. Needham:
The Design of Multiple-Access Computer Systems: Part 2. Comput. J. 10(4): 315-320 (1968) - [j14]Maurice V. Wilkes:
The outer and inner syntax of a programming language. Comput. J. 11(3): 260-263 (1968) - [j13]Maurice V. Wilkes:
Computers Then and Now. J. ACM 15(1): 1-7 (1968) - 1967
- [j12]Maurice V. Wilkes:
The design of multiple-access computer systems. Comput. J. 10(1): 1-9 (1967) - 1966
- [j11]Maurice V. Wilkes:
Book Review: The Agebraic Eigenvalue Problem, by J. H. Wilkinson, 1965; 662 pages. Comput. J. 8(4): 382 (1966) - 1965
- [j10]Maurice V. Wilkes:
Lists and Why They are Useful. Comput. J. 7(4): 278-281 (1965) - [j9]Maurice V. Wilkes:
Slave Memories and Dynamic Storage Allocation. IEEE Trans. Electron. Comput. 14(2): 270-271 (1965) - 1964
- [j8]Maurice V. Wilkes:
Constraint-type statements in programming languages. Commun. ACM 7(10): 587-588 (1964) - [j7]Maurice V. Wilkes:
A programmer's utility filing system. Comput. J. 7(3): 180-184 (1964) - [c6]Maurice V. Wilkes:
Lists and why they are useful. ACM National Conference 1964: 61 - 1962
- [j6]Maurice V. Wilkes:
Book Review. Comput. J. 5(3): 192 (1962) - [c5]Maurice V. Wilkes:
Panel on Priority Problems in Computer Systems. IFIP Congress 1962: 711-715 - 1961
- [j5]Christopher S. Strachey, Maurice V. Wilkes:
Some proposals for improving the efficiency of ALGOL 60. Commun. ACM 4(11): 488-491 (1961) - [j4]Maurice V. Wilkes:
Review: Book Review. Comput. J. 3(4): 219 (1961) - [j3]Maurice V. Wilkes:
Data Transmission and the New Outlook for the Computer Field. Comput. J. 4(1): 1-9 (1961) - [j2]Maurice Vincent Wilkes:
Self-Repairing Computers. IRE Trans. Electron. Comput. 10(1): 93-94 (1961)
1950 – 1959
- 1959
- [c4]Maurice V. Wilkes:
Introductory speech. IFIP Congress 1959: 331-333 - 1958
- [j1]Maurice V. Wilkes:
The Second Decade of Computer Development. Comput. J. 1(3): 98-105 (1958) - [c3]Maurice V. Wilkes:
Microprogramming. AIEE-ACM-IRE Computer Conference (Eastern) 1958: 18-20 - 1952
- [c2]Maurice V. Wilkes:
Pure and applied programming. ACM National Meeting (Toronto) 1952: 121-123 - 1951
- [c1]Maurice V. Wilkes:
The EDSAC computer. AIEE-IRE Computer Conference 1951: 79-83
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-02 21:02 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint