Publications of Professor Keedy

  1. Keedy, J.L. "The Large Machine User Interface", Proc. ICL User's Conference, Melbourne, 1975, pp. 287-297.
  2. Keedy, J.L. "The Management and Technological Approach to the Design of System B", Proc. 7th Australian Computer Conference, Perth, 1976, pp. 997-1013.
  3. Keedy, J.L. "An Outline of the ICL2900 Series System Architecture", Australian Computer Journal, 9, 2, 1977, pp. 53-62.
  4. Keedy, J.L. "On Structuring Operating Systems with Monitors", Australian Computer Journal, 10, 1, 1978, pp. 23-27.
  5. Keedy, J.L. "On the Use of Stacks in the Evaluation of Expressions", ACM Computer Architecture News, Feb. 1978, pp 22-28.
  6. Keedy, J.L. "The Influence of the Information-Hiding Principle on the MONADS Operating System", Proc. Australian Universities Computer Science Seminar, Sydney, 1978, pp. 1-7.
  7. Keedy, J.L. "The MONADS Operating System", Proc. 8th Australian Computer Conference, Canberra, 1978, pp. 903-910.
  8. Rosenberg, J. and Keedy, J.L. "The MONADS Hardware Kernel", Proc. 8th Australian Computer Conference, Canberra, 1978, pp. 1542-1552.
  9. Ramamohanarao, K. and Keedy, J.L. "Job Management in the MONADS Operating System", Proc. 8th Australian Computer Conference, Canberra, 1978, pp. 1476-1488.
  10. Georgiades, A., Richards, I. and Keedy, J.L. "A File System for the MONADS Operating System", Proc. 8th Australian Computer Conference, Canberra, 1978, pp. 547-558.
  11. Richards, I. and Keedy, J.L. "Subsystem Management in the MONADS Operating System", Proc. 8th Australian Computer Conference, Canberra, 1978, pp. 1520-1529.
  12. Keedy, J.L. "On the Evaluation of Expressions using Accumulators, Stacks and Store-to-Store-Instructions", ACM Computer Architecture News, 7, 4, Dec. 1978, pp. 24-27.
  13. Keedy, J.L. "On Structuring Operating Systems with Monitors", ACM Operating Systems Review, 13, 1, Jan. 1979, pp. 5-9 (reprint of 4).
  14. Keedy, J.L., Ramamohanarao, K. and Rosenberg, J. "On Implementing Semaphores with Sets", The Computer Journal, 22, 2, May, 1979, pp. 146-150.
  15. Keedy, J.L. "More on the Use of Stacks in the Evaluation of Expressions", ACM Computer Architecture News, 7, 8, June, 1979, pp. 18-22.
  16. Keedy, J.L. "A Technique for Passing Reference Parameters in an Information-Hiding Architecture", ACM Computer Architecture News, 7, 9, Aug. 1979, pp. 11-15.
  17. Keedy, J.L. "On the Specification of Software Subsystems", Australian Computer Journal, 11, 4, Nov. 1979, pp 127-132.
  18. Keedy, J.L. "A Proposal for a Kernel Design for the OSKAR System", OSKAR Technical Report, University of Karlsruhe, Institut für Informatik II, 1979.
  19. Keedy, J.L. "On the Exportation of Variables", Australian Computer Journal, 12, 1, Feb. 1980, pp. 23-27.
  20. Keedy, J.L. "Virtual Memory", Australian Computer Journal, 12, 2, May, 1980, p. 63 (short survey paper).
  21. Keedy, J.L. "Software Engineering", Australian Computer Society, 129 pp., 1980.
  22. Keedy, J.L. "Paging and Small Segments: A Memory Management Model", Proc. IFIP‑80, 8th World Computer Congress, Melbourne 1980, pp. 337-342.
  23. Rosenberg, J. and Keedy, J.L. "Software Management of a Large Virtual Memory", Proc. 4th Australian Computer Science Conference, Brisbane, 1981, pp. 173-181.
  24. Keedy, J.L. and Rosenberg, J. "Information Hiding - A Key to Successful Software Engineering", Proc. Conference on Computers in Engineering, 1981, Institution of Engineers, Australia, Publication No. 81/8, pp. 1-5, 1981.
  25. Rosenberg, J. and Keedy, J.L. "Information Hiding - A Case Study", Proc. Conference on Computers in Engineering, 1981, Institution of Engineers, Australia, Publication No. 81/8, pp. 6-9, 1981.
  26. Keedy, J.L. "A Report on the Concurrent Processing Features of the CCITT Language CHILL", Telecom Australia Technical Report, Clayton, 1981.
  27. Keedy, J.L. "A Progress Report on the MONADS Project", Australian Computer Science Communications, 3, 2, July 1981.
  28. Keedy, J.L., Rosenberg, J. and Ramamohanarao, K. "On Synchronising Readers and Writers with Semaphores", The Computer Journal, February 1982, pp. 121-125.
  29. Keedy, J.L. and Richards, I. "A Software Engineering View of Files", Australian Computer Journal, 14, 2, pp. 56-61, May 1982.
  30. Keedy, J.L. "An Outline of the ICL2900 Series System Architecture", in "Principles of Computer Structures", ed. Siewiorek, Bell and Newell, McGraw-Hill, 1982, pp. 251-259 (reprint of 3).
  31. Rosenberg, J., Rowe, D.M. and Keedy, J.L. "An Overview of the MONADS Series III Architecture", Proc. 5th Australian Computer Science Conference, Perth, 1982, pp. 58-67.
  32. Gehringer, E.F., Keedy, J.L. and Thomson, J.V. "Dynamic Data Structure Management in MONADS III", Proc. 5th Australian Computer Science Conference, Perth, l982, pp 68-78.
  33. Keedy, J.L., Abramson, D., Rosenberg, J. and Rowe, D.M. "The MONADS Project Stage 2: Hardware Designed to support Software Engineering Techniques", Proc. 5th Australian Computer Conference, Hobart, 1982, pp. 575-580.
  34. Keedy, J.L. "The MONADS View of Software Modules", Proc. 5th Australian Computer Conference, Hobart, 1982, pp. 560-574.
  35. Keedy, J.L., Rosenberg, J., Abramson D. and Rowe, D.M. "A Comparison of the MONADS II and III Computer Systems", Proc. 5th Australian Computer Conference, Hobart, 1982, pp. 581-587.
  36. Keedy, J.L. and Rosenberg, J. "Architectural Support for Software in the MONADS III Computer Design", in Informatik-Fachberichte, 57, Springer Verlag, 1982, pp. 71-86.
  37. Keedy, J.L., Rosenberg, J. and Rowe, D.M. "Trends in Computer Architecture: The Main Stream", Journal of Electrical and Electronics Engineering, Australia, September 1982, pp. 209-219 (Invited Paper).
  38. Keedy, J.L. "An Instruction Set for Evaluating Expressions", IEEE Transactions on Computers, C-32, 5, May 1983, pp. 476-478.
  39. Keedy, J.L. "On Hierarchies and Objects", Proc. 6th Australian Computer Science Conference, Sydney, 1983, pp. 328-333.
  40. Keedy, J.L. "Basic English: A Case Study in Software Engineering", Proc. 10th Australian Computer Conference, Melbourne, 1983, pp. 664-680.
  41. Keedy, J.L. "The Concurrent Processing Features of the CCITT Language CHILL", Australian Telecommunications Review, 17, 1, 1983, pp. 33-51 (reprint of 26).
  42. Keedy, J.L. "A Memory Architecture for Object-Oriented Systems", in "Objekt-orientierte Software- und Hardwarearchitekturen", ed. H. Stoyan and H. Wedekind, Teubner-Verlag, Stuttgart, 1983, pp. 238-250.
  43. Keedy, J.L. "An Implementation of Capabilities without a Central Mapping Table", Proceedings of the 17th Hawaii International Conference on System Sciences, 1984, pp.180-185.
  44. Abramson, D.A. and Keedy, J.L. "Implementing a Large Virtual Memory in a Distributed Computing System", Proceedings of the 18th Hawaii International Conference on System Sciences, 1985, pp.515-522.
  45. Gehringer, E.F. and Keedy, J.L. "Tagged Architecture: How Compelling are its Advantages?", Proceedings of the 12th Annual International Symposium on Computer Architecture, Boston, Mass., 1985, pp.162-170.
  46. Keedy, J.L. and Thomson, J.V. "Command Interpretation and Invocation in an Information Hiding System", IFIP TC-2 Conference on The Future of Command Languages: Foundations for Human-Computer Communication (ed. K.Hopper and I.A.Newman), Rome, Italy, 1985, pp.278-292.
  47. Keedy, J.L. and Freisleben, B. "On the Efficient Use of Semaphore Primitives", Information Processing Letters, 21, 4, October, 1985, pp 199-205.
  48. Keedy, J.L. and Evered, M.E. "Modularity in the Language LEIBNIZ", Proceedings of the First Australian Software Engineering Conference, Canberra, May 1986, pp 7-13.
  49. Rosenberg, J. and Keedy, J.L. "Object Management and Addressing in the MONADS Architecture", Proceedings of the International Workshop on Persistent Object Systems, Appin, Scotland, 1987.
  50. Keedy, J.L., Brössler, P., Henskens, F.A. and Rosenberg, J. "Addressing Objects in a Very Large Distributed System", Proceedings of the IFIP Conference on Distributed Systems, Amsterdam, 1987.
  51. Keedy, J.L. and Rosenberg, J. "Data Engineering with Sets and Sequences", Proceedings of 3rd. Australian Software Engineering Conference, Canberra, May 1988, pp. 79-100.
  52. Rosenberg, J., Koch, D.M. and Keedy, J.L. "A Massive Memory Supercomputer", in Proc. 22nd Hawaii International Conference on System Sciences, pp. 338-345, 1989.
  53. Keedy, J.L. and Rosenberg, J. "Uniform Support for Collections of Objects in a Persistent Environment", Proceedings of the 22nd Hawaii International Conference on System Sciences, 1989.
  54. Keedy, J.L. and Freisleben, B. "Priority Semaphores", The Computer Journal, 32, 1, 1989, pp. 24-28.
  55. Keedy, J.L. and Rosenberg, J. "Support for Objects in the MONADS Architecture", Proceedings of the International Workshop on Persistent Object Systems, Newcastle, Australia, Springer Verlag, 1990, pp. 392-405.
  56. Rosenberg, J., Koch, D.M. and Keedy, J.L. "A Capability-Based Massive Memory Computer", Proceedings of the International Workshop on Persistent Object Systems, Newcastle, Australia, Springer Verlag, 1990, pp. 377-391.
  57. Evered, M. and Keedy, J.L. "A Model for Protection in Object-Oriented Systems", Security and Persistence (Proceedings of the International Workshop on Computer Architectures to Support Security and Persistence of Information, 1990), Springer Verlag, 1990, pp. 67-82.
  58. Freisleben, B., Kammerer, P. and Keedy, J.L. "Capabilities and Encryption: The Ultimate Defense Against Security Attacks?", Security and Persistence (Proceedings of the International Workshop on Computer Architectures to Support Security and Persistence of Information, 1990), Springer Verlag, 1990, pp. 106-119.
  59. Henskens, F.A., Rosenberg, J. and Keedy, J.L. "A Capability-based Distributed Shared Memory", Australian Computer Science Communications, 13, 1, 1991, pp. 29/1-29/12.
  60. Keedy, J. L. and Rosenberg, J. "Uniform Support for Collections of Objects in a Persistent Environment", in "Object-Oriented Databases" ed. Nahouraii and Petry, IEEE Computer Society Press, Los Alamitos, California 1991.
  61. Keedy, J. L. and Vosseberg, K. "Persistent Protected Modules and Persistent Processes as the Basis for a More Secure Operating System", in Proceedings of the 25th Hawaii International Conference on System Sciences, 1992, vol. 1, pp.747-756.
  62. Keedy, J. L. and Vosseberg, K. "Security in a Persistent Distributed Operating System", in Proceedings of the 12th GI/ITG-Conference: "Architektur von Rechensystemen", 1992, Christian-Albrechts-Universität, Kiel, Springer Verlag, pp.306-317.
  63. Rosenberg, J., Keedy, J.L. and Abramson D.A. "Addressing Mechanisms for Large Virtual Memories", The Computer Journal, 35, 4, 1992, pp.369-375.
  64. Keedy, J. L., & Brössler, P. "Implementing Databases in the MONADS Virtual Memory", in Proceedings of the Fifth International Workshop on Persistent Object Systems, Design Implementation and Use, 1992, pp. 319-331.
  65. Keedy, J.L. "A Model for Security and Protection in Persistent Systems", Microprocessors and Microsystems, 17, 3, 1993, pp.139-146.
  66. Vosseberg, K., Brössler, P., & Keedy, J. L. "A Base for Secure Operating System Environments", in Proceedings of the Workshop on Security in Operating Systems, OOPSLA 1993, Washington, Springer Verlag 1994, pp. 43-54.
  67. Henskens, F., Brössler, P., Keedy, J.L. and Rosenberg, J. "Transparent Distribution using Two Object Granularities", in Proc IEEE European Conference on Object-Oriented Programming (Workshop on Object-Orientation in Operating Systems), Kaiserslautern, Germany, pp. 37-47, 1993.
  68. Dunstan, N., Keedy, J. L., & Rosenberg, J. "Support for Concurrent Programming on the MONADS-PC", Australian Computer Journal, 25, 1, 1993, pp.1-6.
  69. Henskens, F., Brössler, P., Keedy, J.L. and Rosenberg, J. "Coarse and Fine Grain Objects in a Distributed Persistent Store", in Proc. Third IEEE International Workshop on Object-Orientation in Operating Systems, Ashville, North Carolina, pp. 116-123, 1993.
  70. Keedy, J. L. "Is Distribution a Genuine Problem for Persistent Systems or is Addressing the Real Problem?", Proceedings of the 28th Hawaii International Conference on System Sciences, 1995, pp.695-704.
  71. Evered, M., Keedy, J.L., Menger, G. and Schmolitzky, A. "How Well Do Inheritance Mechanisms Support Inheritance Concepts?", Lecture Notes in Computer Science, 1204, Springer-Verlag, pp.252-266, 1997.
  72. Evered, M. "Unconstraining Genericity" , Proc. Conf. on Technology of Object-Oriented Languages and Systems, 24, Beijing, 1997, pp. 423-431.
  73. Evered, M., Keedy, J.L., Menger, G. and Schmolitzky, A. "Toward Zero-Overhead Genericity in Java", 3. Fachkongress, Smalltalk and Java in Industrie und Ausbildung, Erfurt, 1997, pp.62-67.
  74. Evered, M., Schmolitzky, A., Menger, G. and Keedy, J.L. "A Strict Approach to Information Hiding in Object-Oriented Languages", IASTED Intl. Conference on Software Engineering, San Francisco, 1997, pp.263-267 .
  75. Evered, M., Keedy, J.L., Menger, G. and Schmolitzky, A. "Genja - A New Proposal for Genericity in Java" , Proc. Conf. on Technology of Object-Oriented Languages and Systems, 25, Melbourne, 1997, pp.181-193 .
  76. Keedy, J.L., Evered, M., Schmolitzky, A. and Menger, G. "Attribute Types and Bracket Implementations" Proc. Conf. on Technology of Object-Oriented Languages and Systems, 25, Melbourne, 1997, pp. 325-338 .
  77. Evered, M., Keedy, J.L., Menger, G. and Schmolitzky, A. "A Useable Collection Framework for Java", 16th Intl. Conf. on Applied Informatics, Garmisch-Parten­kirchen, 1998, pp.115-118.
  78. Menger, G., Keedy, J.L., Evered, M. and Schmolitzky, A. "Collection Types and Implementations in Object-Oriented Software Libraries", Proc. Conf. on Technology of Object-Oriented Languages and Systems, 26, Santa Barbara, 1998, pp.97-109 .
  79. Keedy, J.L. "Überlegungen zur Einführung von Bachelor- und Master-Graden für die Informatik an deutschen Universitäten", Informatik und Ausbildung, GI-Fachtagung 98, Stuttgart, Hrsg. V. Claus, Springer, Informatik aktuell, pp.258-267.
  80. Evered, M. and Menger, G. "Very High Level Programming with Collection Components", Proc. Conf. on Technology of Object-Oriented Languages and Systems, 29, Nancy, 1999.
  81. Schmolitzky, A., Evered, M., Keedy, J.L. and Menger, G. "How Can Covariance in Pragmatical Class Methods be Made Statically Type-safe?", 32 nd International Conference on Technology of Object-Oriented Languages and Systems, Melbourne, 1999.
  82. Schmolitzky, A., Evered, M., Keedy, J.L. and Menger, G. "Late-Bound Pragmatical Class Methods", Journal of Object-Oriented Programming , 13, 7, Nov. 2000, pp. 25-33.
  83. Keedy, J.L. "In Stufen zum Ziel: Zur Einführung von Bachelor- und Master-Graden an deutschen Universitäten", Raabe Verlag, DUZ-Edition, Stuttgart 1999. ISBN 3-88649-361-X.
  84. Evered, M., Menger, G., Keedy, J.L. and Schmolitzky, A. "Software Engineering Despite Object-Orientation", Proc. Australian Computer Science Conference, Canberra, 2000, pp.103-108.
  85. Keedy, J.L. "The German University Degree Structure from an Australian Viewpoint", Proc. EAEEIE Conference, Ulm, April 2000.
  86. Keedy, J.L., Espenlaub, K., Menger, G., A. Schmolitzky, A. and Evered, M. "Software Reuse in an Object Oriented Framework: Distinguishing Types from Implementations and Objects from Attributes", 6th International Conference on Software Reuse, Vienna, June 2000, pp. 420-435.
  87. Keedy, J.L. "Some Misunderstandings about the Anglo-Saxon Graduation System", in K. Mehlhorn, G. Snelting (Hrsg.): Informatik 2000 - Neue Horizonte im neuen Jahrhundert, Jahrestagung der Gesellschaft für Informatik, Berlin, 2000, Springer, pp.44-52.
  88. Keedy, J.L., Espenlaub, K., Hellmann, R. and Pose, R. "SPEEDOS: How to Achieve High Security and Understand It", CERT Conference 2000, Omaha, Nebraska, September 2000.
  89. Keedy, J.L., Menger, G. and Schmolitzky, A. "Languages for Programming with Components", 4th International Multi-Conference Information Society, Ljubljana, Slovenia, 2001, pp. 362-368.
  90. Keedy, J.L., Menger, G. and Heinlein, C. "Support for Subtyping and Code Re-use in Timor", 40th International Conference on Technology of Object-Oriented Languages and Systems (TOOLS Pacific 2002), Sydney, Australia, 2002, Conferences in Research and Practice in Information Technology, vol. 10, pp. 35-43.
  91. Keedy, J.L., Menger, G. and Heinlein, C. "Inheriting from a Common Abstract Ancestor in Timor," Journal of Object Technology (http://www.jot.fm/) , 2002, vol. 1, no. 1, pp. 81-106.
  92. Keedy, J.L., Menger, G., Heinlein, C. and Henskens, F. "Qualifying Types Illustrated by Synchronisation Examples," Net.ObjectDays, Erfurt, Germany, 2002, pp. 334-348.
  93. Keedy, J.L., Menger, G. and Heinlein, C. "Taking Information Hiding Seriously in an Object Oriented Context," Net.ObjectDays, Erfurt, Germany, 2003, pp. 51-65.
  94. Keedy, J.L., Menger, G., Heinlein, C. and Henskens, F. "Qualifying Types Illustrated by Synchronisation Examples," in Objects, Components, Architectures, Services and Applications for a Networked World, International Conference NetObjectDays, NODe 2002, Erfurt, Germany , vol. LNCS 2591, M. Aksit, M. Mezini, and R. Unland, Eds.: Springer, 2003, pp. 330-344, http://link.springer.de/link/service/series/0558/papers/ 2591/ 25910330.pdf.
  95. Keedy, J.L., Espenlaub, K., Menger, G. and Heinlein, C. "Qualifying Types with Bracket Methods in Timor," Journal of Object Technology , vol. 3, no. 1, jot.fm/issues/issue_2004_01/article1, 2004, pp. 101-121.
  96. Keedy, J.L. and Espenlaub, K. "Security through Bracket Routines", Frühjahrstreffen der GI/ITG-Fachgruppe Betriebssysteme, March 2004, Ulm
  97. Keedy, J.L., Heinlein, C. and G. Menger, G. "Reuse Variables: Reusing Code and State in Timor," 8th International Conference on Software Reuse, ICSR 2004, Madrid, 2004, Lecture Notes in Computer Science 3107, Springer Verlag, Berlin, pp. 205-214, http://www.springerlink.com/content/vh35l5ulhhmyk39x/?p=bac45e4a92a2433f9a6bb13aad40781b&pi=12.
  98. Keedy, J.L., Menger, G. and Heinlein, C. "Inheriting Multiple and Repeated Parts in Timor," Journal of Object Technology, vol. 3, no. 10, http://www.jot.fm/issues/issue_2004_11/article1, pp. 99-120, 2004.
  99. Keedy, J.L., Menger, G. and Heinlein, C. "Diamond Inheritance and Attribute Types in Timor," Journal of Object Technology, vol. 3, no. 10, http://www.jot.fm/issues/issue_2004_11/article2, pp. 121-142, 2004.
  100. Keedy, J.L., Espenlaub, K., Menger, G., Heinlein, C. and Evered, M. "Statically Qualified Types in Timor," Journal of Object Technology, vol. 4, no. 7, http://www.jot.fm/issues/issue_2005_9/article5, 2005, pp. 115-137.
  101. Keedy, J. L., Espenlaub, K., Menger, G. and Heinlein, C. "Call-out Bracket Methods in Timor," Journal of Object Technology, vol. 5, no. 1, http://www.jot.fm/issues/issue_2006_01/article1, pp. 51-67, 2006.
  102. Keedy, J.L., Espenlaub, K., Heinlein, C., Menger, G., Henskens, F. and Hannaford, M. "Support for Object Oriented Transactions in Timor," Journal of Object Technology, vol. 5, no. 2, http://www.jot.fm/issues/issue_2006_03/article1, pp. 103-124, 2006.
  103. J. L. Keedy, K. Espenlaub, C. Heinlein, and G. Menger, "Persistent Objects and Capabilities in Timor," Journal of Object Technology, vol. 6, no. 4, May-June 2007, http://www.jot.fm/issues/issue_2007_05/article3, pp. 103-123, 2007.
  104. J. L. Keedy, K. Espenlaub, C. Heinlein, and G. Menger, "Persistent Processes, Distribution and Protection in Timor," Journal of Object Technology, vol. 6, no. 6, July-August 2007, http://www.jot.fm/issues/issue_2007_07/article2, pp. 91-108, 2007.
  105. J. L. Keedy, K. Espenlaub, C. Heinlein, and G. Menger, "Security and Protection in Timor Programs", Journal of Object Technology, Vol. 7, No. 4, May-June 2008, http://www.jot.fm/issues/issue_2008_05/article3/ pp 123-138, 2008.
  106. J. L. Keedy, G. Menger and C. Heinlein, "Types and Co-Types in Timor", Journal of Object Technology, vol. 8, no. 7, November-December 2009, pp. 37-58
    http://www.jot.fm/issues/issue_2009_11/column4/ (reviewed guest paper)
  107. J. L. Keedy, G. Menger and C. Heinlein, "Covariantly Adjusting Co-Types in Timor", Journal of Object Technology, Vol 9. No. 1, January-February 2010, pp 35-55
    http://www.jot.fm/issues/issue_2010_01/column4/ (reviewed guest paper)
  108. J.L. Keedy, "S-RISC - Adding Security to RISC Systems", published and downloadable on the SPEEDOS website, 2023 (https://www.speedos-security.org/)
  109. J.L. Keedy, "Making Computers Secure - volume 1 (250 pages), published and downloadable on the SPEEDOS website, 2023 (https://www.speedos-security.org/)
  110. J.L. Keedy, "Making Computers Secure - volume 2 (391 pages) published and downloadable on the SPEEDOS website, 2023 (https://www.speedos-security.org/)
  111. J.L. Keedy, "TIMOR-An Object- and Component Oriented Language" (196 pages), published and downloadable on the TIMOR website, 2023 (https://www.timor-programming.org/)